Users Advised To Disable Windows ‘Plug-And-Play’ Feature

Share post:

Users are being informed to configure a Windows Registry to prevent the automatic installation of files when connecting a USB to their device.

The update became necessary after researchers revealed how simply plugging a device into Windows could lead to the installation of a vendor application that allowed unknown users to gain SYSTEM privileges.

The flaw was originally found in apps known as “co-installers,” although researchers have also discovered other devices that allow local privilege escalation, including SteelSeries devices.

The problem is caused by Window’s Plug-and-Play feature, and can be solved by the following steps:

    <li>Navigate to ‘HKEY_LOCAL_MACHINE'</li><li>Navigate to SOFTWARE\Microsoft\Windows\CurrentVersion\Device Installer'</li><li>Set the Registry key under the DWORD-32 value named ‘DisableCoInstallers’ to one.</li>

For more information, read the original story in Bleeping Computer.

Featured Tech Jobs

SUBSCRIBE NOW

Related articles

Russian threat actor expanding its target list, warns Five Eyes report

APT29 is increasingly going after cloud services in mo

Canada’s privacy watchdog investigating hack at Global Affairs

Inquiry will look into adequacy of data safeguards at the federal

Sidebar: The powerful Digital Safety Commission

A look at the powers of the proposed five-person body charged with overseeing the Online

Cyber attack on Hamilton knocks out municipal phone, email

One of Ontario’s biggest cities is in the second day of dealing with a cyber attack. Hamilton, a municipality of about 570,000 on the shore of Lake Ontario, said Sunday it had suffered a city-wide phone and email “disruption” to municipal and public library services, which included the Bus Check Info Line and the HSRNow

Become a member

New, Relevant Tech Stories. Our article selection is done by industry professionals. Our writers summarize them to give you the key takeaways