CCE-45496-7Platform: cpe:/o:microsoft:windows_server_2016 | Date: (C)2017-08-03 (M)2023-07-04 |
Allows you to enable or disable Packaged app rules.
Packaged apps (also known as Windows Store apps) are based on a model that ensures all the files within an app package share the same identity. With classic Win32 applications, each file within the application could have a unique identity. With Packaged apps, it is possible to control the entire application by using a single AppLocker rule.
Vulnerability:
A malicious agent could run unauthorized Packaged apps.
Counter Measure:
Configure this policy based on the security requirements for your organization.
Potential Impact:
Depending on configuration, users may be unable to run specific Packaged apps.
Fix:
(1) GPO: Computer ConfigurationWindows SettingsSecurity SettingsApplication Control PoliciesAppLockerPackaged app RulesPackaged app rules
(2) REG: HKEY_LOCAL_MACHINESoftwarePoliciesMicrosoftWindowsSrpV2Appx!EnforcementMode
Parameter:
[enable/disable]
Technical Mechanism:
(1) GPO: Computer Configuration\Windows Settings\Security Settings\Application Control Policies\AppLocker\Packaged app Rules\Packaged app rules
(2) REG: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\SrpV2\Appx!EnforcementMode
CCSS Severity: | CCSS Metrics: |
CCSS Score : 6.3 | Attack Vector: NETWORK |
Exploit Score: 2.8 | Attack Complexity: LOW |
Impact Score: 3.4 | Privileges Required: LOW |
Severity: MEDIUM | User Interaction: NONE |
Vector: AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L | Scope: UNCHANGED |
| Confidentiality: LOW |
| Integrity: LOW |
| Availability: LOW |
| |
References: Resource Id | Reference |
---|
SCAP Repo OVAL Definition | oval:org.secpod.oval:def:40185 |