Windows Defender Flaw Enables Service Hijacking via Symbolic Links
By exploiting this oversight, an attacker can redirect the service to load from an attacker-controlled directory, thereby gaining full control over Defender’s processes and file system.
This technique requires only built-in Windows tools and no additional malware.
Windows Defender normally installs its engine and executable files in a versioned subfolder under ProgramDataMicrosoftWindows DefenderPlatform.
When the WinDefend service initializes or applies an update, it scans this Platform directory and chooses the folder whose name reflects the highest version number.
Microsoft enforces filesystem protections on these folders to prevent modification, but researchers at Zero Salarium discovered that administrators can still create new directories within Platform.
Subverting this version‐selection logic involves creating a symbolic link—using mklink—with a folder name that appears to increment Defender’s version.
The symlink is placed alongside the legitimate versioned folders but points to an unsecured location, such as C:TMPAV, containing copies of the Defender executables.
At the next system reboot, WinDefend misidentifies the symlinked folder as the newest version and launches from the attacker-controlled path.
From there, the intruder gains full read and write privileges over the Defender binaries in use.
Once control is achieved, the attacker can perform a variety of malicious actions.
In one scenario, planting a malicious DLL in the directory can facilitate a DLL side‐loading attack, injecting arbitrary code into a process trusted by the operating system.
Alternatively, an adversary could simply delete key Defender executable files, effectively stopping the service and disabling all real-time protection.
In proof-of-concept demonstrations, removing the symlink after the hijack prevented Defender from locating its engine on subsequent startups, leaving the endpoint entirely unprotected.
Table 1 outlines the step-by-step flow of the exploit and its impact on system security.
| Step | Action | Impact |
|---|---|---|
| 1 | Copy Defender executables to attacker‐controlled folder (e.g., C:TMPAV) | Establishes unsecured location with valid binaries |
| 2 | Reboot the system or restart WinDefend service | Redirects Defender’s version‐selection mechanism |
| 3 | Defender launches from an attacker‐controlled directory | Manipulate files in a symlinked folder (e.g., DLL side‐loading or deletion) |
| 4 | Establishes an unsecured location with valid binaries | Enables code execution or permanent service disablement |
This vulnerability highlights the ongoing cat-and-mouse battle between attackers and endpoint protection systems.
While red teams often focus on evading detection, this method allows for direct neutralization of the defense service itself.
Microsoft has yet to issue an official patch addressing the symlink creation loophole.
Until a fix is released, system administrators should monitor the Platform directory for unauthorized entries and enforce stricter filesystem ACLs to block the creation of new folders by non-system processes.
Find this Story Interesting! Follow us on Google News, LinkedIn and X to Get More Instant Updates
The post Windows Defender Flaw Enables Service Hijacking via Symbolic Links appeared first on Cyber Security News.
show-when is a Web Component library that shows or hides HTML content based on URL,…
WASHINGTON, DC (WOWO) Michigan members of Congress have introduced bipartisan legislation aimed at prohibiting the…
Two employee devices at OpenAI were compromised in a sweeping software supply chain attack targeting…
A maximum-severity zero-day vulnerability in Cisco Catalyst SD-WAN Controller is being actively exploited in the…
This article originally appeared on Inside Climate News, a nonprofit, non-partisan news organization that covers…
INDIANAPOLIS, IND. (WOWO) Three employees with the United States Postal Service are facing felony charges…
This website uses cookies.