• Home
  • News
  • Security
  • CERT to Microsoft: Don't Kill EMET, Windows 10 Is Not as Secure as You Think

CERT to Microsoft: Don't Kill EMET, Windows 10 Is Not as Secure as You Think

  • November 24, 2016
  • 05:47 AM
  • 3

EMET EOL

Will Dormann, a Vulnerability Analyst for the US-CERT Coordination Center (CERT/CC), is advising Microsoft to continue developing EMET because Windows 10 does not provide the same protection measures, in spite of the company's claims.

EMET, which stands for Enhanced Mitigation Experience Toolkit, was launched in 2009 as a standalone application that users could install separately from Windows and bolster the defenses of their operating systems. Earlier this month, Microsoft announced that it moved the EMET End-of-Life date from January 27, 2017, to July 31, 2018.

In its announcement, the company alluded that Windows 10 is as secure as EMET, just because many of EMET's features had been embedded in the operating system's core.

Microsoft didn't embed all of EMET's features in Windows 10

Dormann disagrees with Microsoft's statements. The security expert says that Microsoft did not integrate all of EMET's protection features.

He goes on into detail and splits EMET's protection features into two categories, System-Wide Protection and Application-Specific Protection, and explains that Microsoft only embedded a few of these in Windows 10, mostly at the OS core level.

The problem is that despite feature some of the EMET OS-level protection features, EMET is a fantastic security tool because of its multiple application-level defenses.

These application-specific EMET mitigations are applied as a runtime-injected library into the processes of other apps. Microsoft has not embedded all of EMET's application-level defenses into Windows 10, as Dormann highlights via a simple table.

EMET protections comparison table
EMET protections comparison table (Credit: Will Dormann)

Dormann's table shows that even an older Windows 7 OS with EMET installed is far better protected than an out-of-the-box Windows 10, which Microsoft claims is more secure.

EMET had another role

He also highlights another problem, and that's the slow adoption of new technologies in user software.

"The problem is that the application needs to be specifically compiled to take advantage of CFG," which is Control Flow Guard, one of EMET's security features embedded in Windows 10.

"Out of all of the applications you run in your enterprise, do you know which ones are built with CFG support?" Dormann asks. "If an application is not built to use CFG, it doesn't matter if your underlying operating system supports CFG or not."

EMET's role was to force these extra security features upon applications that didn't have them or the developers didn't bother taking advantage of them.

Companies and users should continue deploying EMET

Furthermore, the security experts recommend that companies continue to use and deploy EMET after the cut-off date.

"Just because Microsoft will stop supporting EMET after July 31, 2018 does not mean that the application will stop working beyond that date. It will likely continue to operate in the same way that it has been working all along. This EOL date simply means that you will not be able to get assistance from Microsoft after that date."

Let's just hope Microsoft decides to open-source the EMET code. There are some people interested in continuing its development.

 

Related Articles:

Microsoft November 2024 Patch Tuesday fixes 4 zero-days, 89 flaws

Windows 10 KB5046613 update released with fixes for printer bugs

Microsoft October 2024 Patch Tuesday fixes 5 zero-days, 118 flaws

Windows Server 2025 released—here are the new features

Microsoft: Chinese hackers use Quad7 botnet to steal credentials

Catalin Cimpanu
Catalin Cimpanu is the Security News Editor for Bleeping Computer, where he covers topics such as malware, breaches, vulnerabilities, exploits, hacking news, the Dark Web, and a few more. Catalin previously covered Web & Security news for Softpedia between May 2015 and October 2016. The easiest way to reach Catalin is via his XMPP/Jabber address at campuscodi@xmpp.is. For other contact methods, please visit Catalin's author page.

Comments

  • The_Thorn_Within Photo
    The_Thorn_Within - 7 years ago

    Now, if someone would help me implement EMET on my system......

  • campuscodi Photo
    campuscodi - 7 years ago

    Just download it from Microsoft's site and install it

  • JohnnyJammer Photo
    JohnnyJammer - 7 years ago

    In case anyone wants to roll it out, install on PC and then configure the rules and export the config file. Then add the files to where you like and run this bath file and edit the location to suit. This installs and then imports the config file.
    ------------------------------
    @ECHO OFF
    TITLE EMET Installer
    cls
    ECHO *************************************************************
    ECHO This will install Microsoft EMT *
    ECHO Script by JohnnyJammer *
    ECHO *************************************************************
    SET /p target=What is the name of the Target computer:
    ECHO Getting Current version
    wmic /node:%target% product where (name like 'EMET 5%%') get name,version
    choice /c yn /m "Continue installing?"
    if %errorlevel% equ 2 GOTO end
    ECHO Copying over EMET to %target%'s C:\ drive
    XCOPY /y "\\ServerLocation\Shares\EMETSetup.msi" "\\%target%\C$"
    XCOPY /y "\\ServerLocation\Shares\EMET_Config.xml" "\\%target%\C$"
    ECHO Now installing EMET
    wmic /node:%target% process call create "msiexec.exe /i C:\EMETSetup.msi /qn /norestart"
    cls
    for /L %%n in (1,1,30) do (
    ping -n 2 127.0.0.1 > %TMP%\PING
    TITLE Updating EMET %%n
    )
    cls
    ECHO Adding Config file
    wmic /node:%target% process call create "C:\Program Files (x86)\EMET 5.5\EMET_Conf.exe --import C:\EMET_Config.xml"
    ECHO Checking version
    wmic /node:%target% product where (name like 'EMET 5%%') get name,version
    ECHO Cleaning up files..........................
    del "\\%target%\C$\EMETSetup.msi"
    del "\\%target%\C$\EMET_Config.xml"
    del %TMP%\PING
    ECHO Done.......................................
    TITLE EMET Installer
    :end
    -------------------------------
    You can always use then @file.txt on the WMIC command line to install on multiple machines at once.

Post a Comment Community Rules
You need to login in order to post a comment

Not a member yet? Register Now

You may also like:

ThreatLocker

Login

Reporter

Help us understand the problem. What is going on with this comment?

Read our posting guidelinese to learn what content is prohibited.

SUBMIT