Report Read-Only Memory Map Operations on Unapproved Executable by .NET Applications
search cancel

Report Read-Only Memory Map Operations on Unapproved Executable by .NET Applications

book

Article ID: 286762

calendar_today

Updated On:

Products

Carbon Black App Control (formerly Cb Protection)

Issue/Introduction

  • Events generated in Console with the Rule Name, "Report read-only memory map operations on unapproved executable by .NET applications".
  • Events generated in Console with Description similar to:
    File C:\Program Files (x86)\ACME Account\software.exe [7C22....AF88] would have blocked if the rule was not in Report Only mode.

Environment

  • App Control Agent: All Supported Versions
  • App Control Console: All Supported Versions
  • Microsoft Windows: All Supported Versions

Cause

  • A .NET vulnerability would allow attackers to "execute" .NET content without having to load a .dll or .exe file.
  • This Custom Rule triggers when a read operation occurs on an Unapproved File.
  • Known-good, trusted files, should have an Approval Method to prevent them being written as Locally Unapproved whenever possible.

Resolution

Reminders:

  • This Custom Rule triggers due to the Read operation on an Unapproved File
    • Execution Control (Allow) Rules will not suppress the Event as they do not cover the Read operation.
  • This Custom Rule is in Report Only by default and does not actually enforce any Unapproved Blocks.
    • This is by design to allow for environmental tuning for known-good, trusted applications.
    • After environmental tuning is complete this Custom Rule should be disabled in favor of the Custom Rule, Deny read-only memory map operations on unapproved executables by .NET applications

 

Preventing the Custom Rule from triggering:

Either of the following options will prevent this Custom Rule from triggering for known-good, trusted applications. Review the options below and discuss with your internal teams to determine which option aligns best for the application and environment:

Additional Information

  • Custom Rules included with App Control to detect and mitigate this vulnerability include:
    • Do not treat these processes as .NET applications
    • Report read-only memory map operations on unapproved executables by .NET applications
    • [Sample] Prompt for read-only memory map operations on unapproved executables by .NET applications in medium enforcement
    • [Sample] Deny read-only memory map operations on unapproved executables by .NET applications in high enforcement
    • Deny read-only memory map operations on banned executables by .NET applications
  • Be sure to research the files triggering the Custom Rule before issuing Approvals to make sure they don't pose a threat to your environment.