Skip the navigation

Windows RT: Bug not a bug?

Microsoft, kernel expert take sides on whether this week's Windows RT flaw is a security vulnerability that needs to be patched

January 11, 2013 01:52 PM ET

Computerworld - Microsoft and a respected researcher disagreed this week about whether a bug in Windows RT is actually a security vulnerability that should be patched.

The bug, revealed Jan. 5 by a hacker known as "clrokr," can be used to bypass a restriction in Windows RT that prevents its "desktop" mode from running anything but select, Microsoft-made software. By changing a byte in the Windows RT kernel, said clrokr, Windows RT users could install standard Windows applications -- assuming they had been recompiled for the OS's ARM processor -- and run them on the desktop.

By default, only Microsoft's Office RT, a scaled-down version of Office 2013; Internet Explorer 10 (IE10); the File Explorer file manager; and several other utilities created by the Redmond, Wash. developer, are allowed on the Windows RT desktop.

Other hackers have taken clrokr's work to actually install recompiled Windows apps on RT-powered devices.

Most have portrayed clrokr's discovery as a "jailbreak," meaning a way for do-it-yourselfers to sneak unauthorized software onto a tablet running Windows RT. Jailbreaks have been used for years by iPhone owners to install apps that have not been approved by Apple for its App Store distribution market.

But the same technique could also be used to install malicious software, argued Tarjei Mandt, a researcher who has found dozens of security vulnerabilities in the Windows kernel, and reported them to Microsoft for patching. Mandt works as a senior security researcher for Azimuth Security, an Australian security consultancy founded by researchers formerly at IBM's Internet Security Systems XForce.

"This is not your traditional security vulnerability, as it already requires the user to have administrative privileges, [which is] the reason why Microsoft doesn't classify it as a security vulnerability," Mandt said in an email interview. "[But] if the goal of the operating system is to prevent unverified drivers and executables from running, as the case is with Window RT, then in my opinion it should be classified as a security issue or security bypass."

Microsoft doesn't see it that way.

"The scenario outlined is not a security vulnerability and does not pose a threat to Windows RT users," Microsoft categorically said Tuesday in a statement. The company also hinted at its rationale: "The mechanism described is not something the average user could, or reasonably would, leverage as it requires local access to a system, local administration rights and a debugger in order to work," Microsoft said.

True, acknowledged Mandt, who admitted clrokr's tactic had flaws. "Although the attack in this case can be used to disable [Windows RT's] signature enforcement at runtime, launching something that can survive a reboot is a completely different story due to the extensive verification made by UEFI Secure Boot," Mandt said.



Our Commenting Policies
Consumerization of IT: Be in the know
consumer tech

Our new weekly Consumerization of IT newsletter covers a wide range of trends including BYOD, smartphones, tablets, MDM, cloud, social and what it all means for IT. Subscribe now and stay up to date!