Descripción
The Microsoft vulnerable driver block list is implemented as Windows Defender Application Control (WDAC) policy. On systems that do not have hypervisor-protected code integrity (HVCI) enabled, entries specify only the to-be-signed (TBS) part of signer certificate are properly blocked, but signing certificate’s TBS hash along with a 'FileAttribRef' qualifier (such file name or version) will be blocked. This vulnerability affects any system does HVCI enabled supported (HVCI available in 10, 11, and Server 2016 later). NOTE: The vendor states blocklist intended for use HVCI, while without should App Control, custom require granular approach proper enforcement.
https://learn.microsoft.com/en-us/windows/security/application-security/application-control/app-control-for-business/design/microsoft-recommended-driver-block-rules
https://learn.microsoft.com/en-us/windows/security/hardware-security/enable-virtualization-based-protection-of-code-integrity
https://x.com/JonnyJohnson_/status/1895103112924307727