Users Advised To Disable Windows ‘Plug-And-Play’ Feature

Share post:

Users are being informed to configure a Windows Registry to prevent the automatic installation of files when connecting a USB to their device.

The update became necessary after researchers revealed how simply plugging a device into Windows could lead to the installation of a vendor application that allowed unknown users to gain SYSTEM privileges.

The flaw was originally found in apps known as “co-installers,” although researchers have also discovered other devices that allow local privilege escalation, including SteelSeries devices.

The problem is caused by Window’s Plug-and-Play feature, and can be solved by the following steps:

    <li>Navigate to ‘HKEY_LOCAL_MACHINE'</li><li>Navigate to SOFTWARE\Microsoft\Windows\CurrentVersion\Device Installer'</li><li>Set the Registry key under the DWORD-32 value named ‘DisableCoInstallers’ to one.</li>

For more information, read the original story in Bleeping Computer.

SUBSCRIBE NOW

Related articles

New macOS Malware Exploits Apple’s Security Features to Stay Hidden and Steal User Data

A newly discovered variant of the Banshee macOS Stealer malware is putting 100 million Apple users at risk...

Microsoft MFA Outage Blocks Access to Microsoft 365 Apps, Raising Cloud Reliability Concerns

Microsoft faced another significant service disruption over the weekend, with a Multi-Factor Authentication (MFA) outage that blocked users...

Cyber Attack Hits Key Dutch University, Raising Concerns for Chip Giant ASML

Eindhoven University of Technology, a critical partner for semiconductor giant ASML Holding NV, has been hit by a...

Researcher Finds Critical Facebook Server Flaw, Warns Other Platforms May Be at Risk

Security researcher Ben Sadeghipour recently discovered a critical vulnerability in Meta’s Facebook ad platform that allowed him to...

Become a member

New, Relevant Tech Stories. Our article selection is done by industry professionals. Our writers summarize them to give you the key takeaways