<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Code-Signing — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/code-signing/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Mon, 04 May 2026 14:17:05 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/code-signing/feed.xml" rel="self" type="application/rss+xml"/><item><title>Code Signing Policy Modification Through Built-in Tools</title><link>https://feed.craftedsignal.io/briefs/2024-01-09-code-signing-policy-modification/</link><pubDate>Mon, 04 May 2026 14:17:05 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-09-code-signing-policy-modification/</guid><description>Attackers may attempt to disable or modify code signing policies on Windows systems by using built-in tools like bcdedit.exe in order to execute unsigned or self-signed malicious code.</description><content:encoded><![CDATA[<p>Attackers may attempt to subvert trust controls by disabling or modifying the code signing policy. This allows them to execute unsigned or self-signed malicious code. This can be achieved by modifying boot configuration data (BCD) settings using the built-in bcdedit.exe utility on Windows. Disabling Driver Signature Enforcement (DSE) allows the loading of untrusted drivers, which can compromise system integrity. The rule identifies commands that can disable the Driver Signature Enforcement feature. The scope of the targeting is broad, as it can affect any Windows system where an attacker gains sufficient privileges to modify the BCD settings. This activity is detected by analyzing process execution events for specific command-line arguments used with bcdedit.exe. The detection rule was last updated on 2026-05-04.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains administrative privileges on a Windows system.</li>
<li>The attacker executes <code>bcdedit.exe</code> with arguments to disable driver signature enforcement. Example: <code>bcdedit.exe /set testsigning on</code> or <code>bcdedit.exe /set nointegritychecks on</code>.</li>
<li>The <code>bcdedit.exe</code> modifies the Boot Configuration Data (BCD) store.</li>
<li>The system is restarted to apply the changes made to the BCD.</li>
<li>The attacker loads an unsigned or self-signed malicious driver.</li>
<li>The malicious driver executes with kernel-level privileges.</li>
<li>The attacker performs malicious activities such as installing rootkits, bypassing security controls, or stealing sensitive data.</li>
<li>The attacker maintains persistence by ensuring the malicious driver is loaded on subsequent system reboots.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful modification of the code signing policy can lead to the execution of unsigned or self-signed malicious code, which can compromise the integrity and security of the system. Attackers can install rootkits, bypass security controls, or steal sensitive data. The impact can range from individual system compromise to broader network-wide attacks, depending on the attacker&rsquo;s objectives.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Code Signing Policy Modification Through Built-in Tools&rdquo; to your SIEM to detect the execution of <code>bcdedit.exe</code> with arguments used to disable code signing (process.args).</li>
<li>Enable process creation logging with command line arguments on Windows systems to ensure the Sigma rule can capture the relevant events (logsource).</li>
<li>Investigate any detected instances of code signing policy modification, as this activity is typically not legitimate and can indicate malicious activity. The rule <code>First Time Seen Driver Loaded - df0fd41e-5590-4965-ad5e-cd079ec22fa9</code> can be used to detect suspicious drivers loaded into the system after the command was executed.</li>
<li>Ensure that Driver Signature Enforcement is enabled on all systems.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>defense-evasion</category><category>code-signing</category><category>windows</category></item><item><title>osslsigncode Stack Buffer Overflow Vulnerability (CVE-2026-39853)</title><link>https://feed.craftedsignal.io/briefs/2026-04-osslsigncode-overflow/</link><pubDate>Thu, 09 Apr 2026 16:16:31 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-osslsigncode-overflow/</guid><description>A stack buffer overflow vulnerability (CVE-2026-39853) exists in osslsigncode versions prior to 2.12 due to insufficient validation of digest length during PKCS#7 signature verification, potentially leading to arbitrary code execution.</description><content:encoded><![CDATA[<p>A stack buffer overflow vulnerability has been identified in osslsigncode, a tool used for Authenticode signing and timestamping. Specifically, versions prior to 2.12 are susceptible to CVE-2026-39853. The vulnerability occurs during the verification of PKCS#7 signatures in PE, MSI, CAB, and script files. The code copies the digest value from a parsed SpcIndirectDataContent structure into a fixed-size stack buffer (64 bytes) without proper length validation. This allows an attacker to craft a malicious signed file containing an oversized digest field within the SpcIndirectDataContent structure. When a user attempts to verify this malicious file using a vulnerable version of osslsigncode, the resulting unbounded memcpy operation overflows the stack buffer, potentially corrupting adjacent stack state and leading to arbitrary code execution. This vulnerability has been addressed in osslsigncode version 2.12.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker crafts a malicious signed file (PE, MSI, CAB, or script) with an oversized digest field within the SpcIndirectDataContent structure of the PKCS#7 signature.</li>
<li>The malicious file is distributed to a target user or system.</li>
<li>The target system uses a vulnerable version of osslsigncode (prior to 2.12) to verify the signature of the malicious file using the command <code>osslsigncode verify</code>.</li>
<li>During the signature verification process, osslsigncode parses the SpcIndirectDataContent structure.</li>
<li>The vulnerable code attempts to copy the digest value from the parsed SpcIndirectDataContent into a fixed-size stack buffer (64 bytes) without proper length validation.</li>
<li>Due to the oversized digest field, the <code>memcpy</code> operation overflows the stack buffer.</li>
<li>The stack buffer overflow corrupts adjacent stack state, potentially overwriting return addresses or other critical data.</li>
<li>The corrupted stack state leads to arbitrary code execution under the context of the osslsigncode process, granting the attacker control of the system.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-39853 allows an attacker to execute arbitrary code on a system running a vulnerable version of osslsigncode. This can lead to complete system compromise, data exfiltration, or further malicious activities. While the specific number of affected systems is unknown, any system using osslsigncode for signature verification prior to version 2.12 is potentially vulnerable. The impact is significant, as it can undermine the trust placed in Authenticode signatures.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade osslsigncode to version 2.12 or later to patch CVE-2026-39853 and prevent stack buffer overflows.</li>
<li>Monitor systems for unexpected crashes or unusual behavior associated with osslsigncode, which could indicate exploitation attempts.</li>
<li>Implement input validation and sanitization on digest lengths during signature verification to prevent similar vulnerabilities in other applications.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>osslsigncode</category><category>buffer-overflow</category><category>authenticode</category><category>code-signing</category><category>CVE-2026-39853</category></item><item><title>Code Signing Policy Modification Through Registry</title><link>https://feed.craftedsignal.io/briefs/2024-01-code-signing-policy-modification/</link><pubDate>Tue, 02 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-code-signing-policy-modification/</guid><description>Attackers may modify the Windows registry to disable code signing policy, allowing the execution of unsigned or self-signed malicious code, thereby bypassing security controls and enabling defense evasion.</description><content:encoded><![CDATA[<p>Attackers can modify the <code>BehaviorOnFailedVerify</code> registry key to disable code signing enforcement, allowing the execution of unsigned or self-signed code. This subverts trust controls and enables attackers to load and execute malicious drivers or other executables without proper validation. The targeted registry value controls how the system behaves when a driver&rsquo;s signature verification fails, and altering this value can weaken system security. This technique is a common method to bypass security measures that rely on code signing to ensure the integrity and authenticity of software. This activity has been observed across various environments where endpoint detection and response solutions are deployed. The rule identifies registry modifications that can disable DSE.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains initial access to the target system through methods such as phishing, exploiting vulnerabilities, or social engineering.</li>
<li>The attacker escalates privileges to obtain administrative rights, which are required to modify the registry.</li>
<li>The attacker uses a command-line tool, such as <code>reg.exe</code> or PowerShell, to modify the <code>BehaviorOnFailedVerify</code> registry value.</li>
<li>The registry value is changed to either &ldquo;0&rdquo; or &ldquo;1&rdquo;, effectively disabling or weakening code signing enforcement.</li>
<li>The attacker loads an unsigned or self-signed malicious driver or executable.</li>
<li>The malicious code executes without proper validation, allowing the attacker to perform malicious activities on the system.</li>
<li>The attacker may then establish persistence, move laterally within the network, or exfiltrate sensitive data.</li>
<li>The final objective could be data theft, ransomware deployment, or establishing a long-term foothold within the compromised environment.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful modification of the code signing policy can lead to the execution of arbitrary code without proper validation, potentially compromising the entire system. Attackers can use this technique to install rootkits, bypass security software, and perform other malicious activities. Depending on the attacker&rsquo;s objectives, this can result in data theft, system instability, or complete system compromise. While no specific victim count or sector is mentioned, any Windows system where code signing is relied upon for security is potentially at risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Code Signing Policy Modification Through Registry</code> to your SIEM to detect suspicious registry modifications (rule.name). Tune the rule to exclude legitimate software installers or system administration tools that may temporarily modify these settings.</li>
<li>Monitor registry events, specifically changes to the <code>BehaviorOnFailedVerify</code> value, to identify potential attempts to disable code signing policy (event.type, registry.value, registry.data.strings).</li>
<li>Investigate any alerts generated by the detection rule, focusing on the process execution chain and the legitimacy of the user account performing the action (rule.note).</li>
<li>Enable Sysmon registry event logging to gain better visibility into registry modifications (setup).</li>
<li>Ensure that Driver Signature Enforcement (DSE) is enabled on all systems to prevent the loading of unsigned drivers (rule.description).</li>
<li>Deploy the Sigma rule <code>Suspicious Process Modifying Code Signing Policy Registry</code> to identify potentially malicious processes attempting to disable code signing (rule.name).</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>defense-evasion</category><category>registry-modification</category><category>code-signing</category></item></channel></rss>