According to Microsoft, Windows 10 is the most secure desktop operating system that the company ever created. The tech giant Microsoft included several security mechanisms but, according to a study that has now been released, Windows 10 is less secure than Windows 7 when running the tool Enhanced Mitigation Experience Toolkit (EMET).
Windows 10 is the safest ever! Who said it was Microsoft itself and even gave 10 reasons for users to use this new version. But now a study published by researchers at Carnegie Mellon University shows that Windows 10 is less secure than Windows 7 with EMET.
As you can see the second table Windows 7 with EMET provides much more protection than Windows 10 (without EMET).
His defense for EMET, “Windows 10 includes all of the mitigation features that EMET administrators have come to rely on such as DEP, ASLR, and Control Flow Guard (CFG) along with many new mitigations to prevent bypasses in UAC and exploits targeting the browser.
Microsoft’s statement above overlooks the primary reason for someone to run EMET. In particular, users running EMET to protect applications that do not opt in to all of the exploit mitigations that it should. Even though the underlying Windows operating system supports a mitigation, doing so does not necessarily mean that it will be applied to an application.
As you can see the second table Windows 7 with EMET provides much more protection than Windows 10 (without EMET).
His defense for EMET, “Windows 10 includes all of the mitigation features that EMET administrators have come to rely on such as DEP, ASLR, and Control Flow Guard (CFG) along with many new mitigations to prevent bypasses in UAC and exploits targeting the browser.
Microsoft’s statement above overlooks the primary reason for someone to run EMET. In particular, users running EMET to protect applications that do not opt in to all of the exploit mitigations that it should. Even though the underlying Windows operating system supports a mitigation, doing so does not necessarily mean that it will be applied to an application.
Developer adoption of exploit mitigations takes place at a slower rate than we’d like to see. For example, even Microsoft does not compile all of Office 2010 with the /DYNAMICBASE flag to indicate compatibility with ASLR. What is the impact? An attacker may be able to work around ASLR by causing a non-DYNAMICBASE library to be loaded into the process space of the vulnerable application, potentially resulting in successful exploitation of a memory corruption vulnerability. What do we do to protect ourselves against this situation? We run EMET with application-specific mitigations enabled!”
EMET is a tool that helps prevent vulnerabilities in software from being exploited for this makes use of various innovative technologies that function as special protections. These security mitigation technologies do not guarantee that vulnerabilities can not be exploited. However, they complicate the entire process.
EMET is a tool that helps prevent vulnerabilities in software from being exploited for this makes use of various innovative technologies that function as special protections. These security mitigation technologies do not guarantee that vulnerabilities can not be exploited. However, they complicate the entire process.
This is not a normal situation, especially because EMET aims to improve the security of Windows 10. The tech giant Microsoft will certainly solve the problem, but it smacks of a less positive image on a system that you want to be safe.
Kelvin Alexander