Application Security

11/5/2016
08:20 AM
Connect Directly
Twitter
LinkedIn
RSS
E-Mail
50%
50%

Microsoft Extends Support For Doomed EMET To July 2018

After that date, Microsoft officially will pull the plug on a toolkit that enterprises have used for years to protect against advanced threats.

Responding to what it described as customer feedback, Microsoft this week extended support for its widely used Enhanced Mitigation Experience Toolkit (EMET).

Instead of the originally planned end-of-life date of January 27, 2017, Microsoft will now continue to support the security toolkit through July 31, 2018.

After that date, there are no plans to offer security patches or other support for EMET, Microsoft principal program lead manager Jeffrey Sutherland announced in a blog post on the company’s TechNet this week.

"For improved security, our recommendation is for customers to migrate to Windows 10," Sutherland said.

The news is likely to come both as a surprise and a bit of relief for organizations using EMET. In announcing the extension, Microsoft for the first time also disclosed plans about finally pulling the plug on a technology that has served as an important bulwark against malicious exploits for many Windows organizations for the past. But its new deadline of July 2018 at least gives organizations 18 months to prepare for it.

Microsoft introduced EMET in 2009 as a measure to help enterprises mitigate and manage security vulnerabilities in Windows. Among other things, the company intended for the free toolkit to be used by administrators to activate settings and security features that were not always enabled by default in Windows and for locking down application access to OS features that they didn’t need.

At the time, Microsoft had described EMET as a necessary toolkit to help secure their Windows environment in the three- to four years it used to take the company to release new and updated Windows versions. Over the years, administrators have used the technology to thwart everything from ordinary exploits to advanced zero-day threats.

"It allowed us to interrupt and disrupt many of the common exploit kits employed by attackers at the time without waiting for the next Windows release," Sutherland said this week. The toolkit also offered the company a place to assess the functionality of new security features, he said.

Recently, though, EMET’s usefulness has diminished somewhat, as many of the security controls in the tool were integrated into successive Windows versions - most notably, Windows 10.

The stopgap nature of EMET’s features means that many of them are no longer robust enough to handle the challenges posed by current security exploits, Sutherland said. As a result, multiple, sometimes trivial, exploits are available in the wild currently for bypassing EMET, he noted.

Earlier this year, several security researchers warned of how some exploits from the Angler Exploit kit were completely getting around EMET. "This is something we are seeing for the first time in the wild, and we only observed it affecting systems running Windows 7," FireEye warned at that time.

The exploit allowed attackers to install TeslaCrypt ransomware on Windows 7 systems, prompting concern about the effectiveness of EMET in stopping such threats.

Sutherland noted other problems with EMET as well. Because EMET hooks into low-level areas of Windows in a manner not originally intended by developers, it has caused performance and reliability problems for systems running it. "And this presents an ongoing problem for customers since every OS or application update can trigger performance and reliability issues," due to compatibility issues, he said.

Related stories:

Jai Vijayan is a seasoned technology reporter with over 20 years of experience in IT trade journalism. He was most recently a Senior Editor at Computerworld, where he covered information security and data privacy issues for the publication. Over the course of his 20-year ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
New Free Tool Scans for Chrome Extension Safety
Dark Reading Staff 2/21/2019
Making the Case for a Cybersecurity Moon Shot
Adam Shostack, Consultant, Entrepreneur, Technologist, Game Designer,  2/19/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
5 Emerging Cyber Threats to Watch for in 2019
Online attackers are constantly developing new, innovative ways to break into the enterprise. This Dark Reading Tech Digest gives an in-depth look at five emerging attack trends and exploits your security team should look out for, along with helpful recommendations on how you can prevent your organization from falling victim.
Flash Poll
How Enterprises Are Attacking the Cybersecurity Problem
How Enterprises Are Attacking the Cybersecurity Problem
Data breach fears and the need to comply with regulations such as GDPR are two major drivers increased spending on security products and technologies. But other factors are contributing to the trend as well. Find out more about how enterprises are attacking the cybersecurity problem by reading our report today.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-9015
PUBLISHED: 2019-02-22
A Path Traversal vulnerability was discovered in MOPCMS through 2018-11-30, leading to deletion of unexpected critical files. The exploitation point is in the "column management" function. The path added to the column is not verified. When a column is deleted by an attacker, the correspond...
CVE-2019-9016
PUBLISHED: 2019-02-22
An XSS vulnerability was discovered in MOPCMS through 2018-11-30. There is persistent XSS that allows remote attackers to inject arbitrary web script or HTML via the form[name] parameter in a mod=column request, as demonstrated by the /mopcms/X0AZgf(index).php?mod=column&ac=list&menuid=28&am...
CVE-2018-20784
PUBLISHED: 2019-02-22
In the Linux kernel before 4.20.2, kernel/sched/fair.c mishandles leaf cfs_rq's, which allows attackers to cause a denial of service (infinite loop in update_blocked_averages) or possibly have unspecified other impact by inducing a high load.
CVE-2019-9003
PUBLISHED: 2019-02-22
In the Linux kernel before 4.20.5, attackers can trigger a drivers/char/ipmi/ipmi_msghandler.c use-after-free and OOPS by arranging for certain simultaneous execution of the code, as demonstrated by a "service ipmievd restart" loop.
CVE-2019-9004
PUBLISHED: 2019-02-22
In Eclipse Wakaama (formerly liblwm2m) 1.0, core/er-coap-13/er-coap-13.c in lwm2mserver in the LWM2M server mishandles invalid options, leading to a memory leak. Processing of a single crafted packet leads to leaking (wasting) 24 bytes of memory. This can lead to termination of the LWM2M server afte...