Report Read-Only Memory Map Operations on Unapproved Executable by .NET Applications
book
Article ID: 286762
calendar_today
Updated On:
Products
Carbon Black App Control (formerly Cb Protection)
Issue/Introduction
Events generated in Console with the Rule Name, "Report read-only memory map operations on unapproved executable by .NET applications".
Events generated in Console with Description similar to:
File C:\Program Files (x86)\ACME Account\software.exe [7C22....AF88] would have blocked if the rule was not in Report Only mode.
Environment
App Control Agent: All Supported Versions
App Control Console: All Supported Versions
Microsoft Windows: All Supported Versions
Cause
A .NET vulnerability would allow attackers to "execute" .NET content without having to load a .dll or .exe file.
This Custom Rule triggers when a read operation occurs on an Unapproved File.
Known-good, trusted files, should have an Approval Method to prevent them being written as Locally Unapproved whenever possible.
Resolution
Reminders:
This Custom Rule triggers due to the Read operation on an Unapproved File
Execution Control (Allow) Rules will not suppress the Event as they do not cover the Read operation.
This Custom Rule is in Report Only by default and does not actually enforce any Unapproved Blocks.
This is by design to allow for environmental tuning for known-good, trusted applications.
After environmental tuning is complete this Custom Rule should be disabled in favor of the Custom Rule, Deny read-only memory map operations on unapproved executables by .NET applications
Preventing the Custom Rule from triggering:
Either of the following options will prevent this Custom Rule from triggering for known-good, trusted applications. Review the options below and discuss with your internal teams to determine which option aligns best for the application and environment:
Approve the File triggering the Custom Rule, examples: