There are multiple write ups of the original vuln, I’ve pasted the wrong one into the post so apologies, I’ll go back and fix it. Somehow linked AI slop it appears.
Microsoft have rated the ability for non-admin users to stop Windows patching as a moderate issue and closed the case.
EDR providers, including Microsoft, probably want to add signatures for junction points from \inetpub being created on boot drive as it doesn’t look like this will be fixed any time soon.
@GossiTheDog By this logic is there any vulnerability that would be more than moderate?
All you ever need to do to fix sabotage is identify and revert all malicious changes(the details are left as an exercise for the reader); and your system is implemented on a computer built from reality, even if your RAM and block device budgets are large; so the hamming distance between the compromised state and the correct state will be finite. What more could you need?
@GossiTheDog “please keep this case open until the fix is delivered” “please transfer this case to the team responsible, and don’t close it until the fix is delivered” etc.
Insisting that the ticket stays open will drive them nuts because eventually it’s a red light on someone’s dashboard, and it’ll get escalated after a while…
@GossiTheDog I was able to keep a ticket open with Oracle for 2 years until a confirmed bug got fixed. Something along the lines of “we are tracking this ticket to ensure the fix is delivered, please keep it open until fixed” usually works pretty well.