Hot Take This Windows security feature blocks dangerous drivers before they strike

Parkinsond

Level 62
Thread author
Verified
Well-known
Dec 6, 2023
5,185
14,805
6,069
Vulnerable Driver Blocklist is a security feature under Microsoft's Core Isolation umbrella for Windows. For those unaware about Core Isolation itself, this is a collection of capabilities that protect "core" Windows processes from malicious software by isolating them in memory. The Vulnerable Driver Blocklist falls within this category because it essentially offers a list of drivers that are restricted by default from ever running in Windows.

The Vulnerable Driver Blocklist is the result of an ongoing collaboration between Microsoft and independent hardware vendors (IHVs) and OEMs. Whenever a driver vulnerability is reported, the Redmond tech giant works with vendors to patch the security threat and add a driver version to the blocklist if the threat factor is significantly high and the risk of breaking compatibility is relatively low.

This is a particularly important aspect to understand. Microsoft's Vulnerable Driver Blocklist isn't exhaustive. It doesn't list all the compromised drivers because sometimes, blocking a driver without the user really knowing about it can cause poor user experience on Windows, such as device malfunctions and the dreaded Blue Screen of Death (BSOD). This is exactly why maintaining the list is always a careful balancing act for Microsoft.

The Vulnerable Driver Blocklist is updated through Windows Update during feature updates, which means that it is modified roughly 1-2 times a year. Whenever a driver vendor issues an update for their compromised software, they can contact Microsoft to update this blocklist.

 
Have you ever heard of the Userchoice Protection Driver (UCPD.sys) that Microsoft added to its Windows 10 and Windows 11 operating systems in 2024? It is a protective driver designed to prevent third-party applications or scripts from making changes to Registry keys that fall into the UserChoice category. This includes system defaults, such as the web browser, PDF viewer, or widgets.

Apps or scripts could make changes to default settings on Windows by editing certain keys in the Registry directly. With UCPD active, Microsoft implemented a check that allows or disallows changes to these keys.

If the change comes from a legitimate Microsoft process, it is allowed. If the change comes from a non-Microsoft process,, it is not allowed.

So, using the Settings application works, while using a script to make the changes does not.