CCE-45488-4Platform: cpe:/o:microsoft:windows_server_2016 | Date: (C)2017-08-03 (M)2023-07-04 |
Allow members of the local Administrators group access to run all executable files.
This setting is configured by using an XML blob that is store in the registry setting for this setting. You can obtain the XML blob by configuring the desired setting in the Local Group Policy console and then retrieving the blob from the registry setting.
Vulnerability:
A malicious agent could run unauthorized programs and software.
Counter Measure:
Configure this policy to allow all users to run all files.
Potential Impact:
Depending on configuration, users may be unable to run specific applications.
Fix:
(1) GPO: Computer ConfigurationWindows SettingsSecurity SettingsApplication Control PoliciesAppLockerExecutable RulesAppLocker: Executable Rules: (Default Rule) All files
(2) REG: HKEY_LOCAL_MACHINESoftwarePoliciesMicrosoftWindowsSrpV2Exefd686d83-a829-4351-8ff4-27c7de5755d2!Value
Parameter:
[enable/disable]
Technical Mechanism:
(1) GPO: Computer Configuration\Windows Settings\Security Settings\Application Control Policies\AppLocker\Executable Rules\AppLocker: Executable Rules: (Default Rule) All files
(2) REG: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\SrpV2\Exe\fd686d83-a829-4351-8ff4-27c7de5755d2!Value
CCSS Severity: | CCSS Metrics: |
CCSS Score : 7.2 | Attack Vector: NETWORK |
Exploit Score: 1.2 | Attack Complexity: LOW |
Impact Score: 5.9 | Privileges Required: HIGH |
Severity: HIGH | User Interaction: NONE |
Vector: AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H | Scope: UNCHANGED |
| Confidentiality: HIGH |
| Integrity: HIGH |
| Availability: HIGH |
| |
References: Resource Id | Reference |
---|
SCAP Repo OVAL Definition | oval:org.secpod.oval:def:40345 |