Check: WN11-00-000145
Microsoft Windows 11 STIG:
WN11-00-000145
(in versions v1 r6 through v1 r1)
Title
Data Execution Prevention (DEP) must be configured to at least OptOut. (Cat I impact)
Discussion
Attackers are constantly looking for vulnerabilities in systems and applications. Data Execution Prevention (DEP) prevents harmful code from running in protected memory locations reserved for Windows and other programs.
Check Content
Verify the DEP configuration. Open a command prompt (cmd.exe) or PowerShell with elevated privileges (Run as administrator). Enter "BCDEdit /enum {current}". (If using PowerShell "{current}" must be enclosed in quotes.) If the value for "nx" is not "OptOut", this is a finding. (The more restrictive configuration of "AlwaysOn" would not be a finding.)
Fix Text
Configure DEP to at least OptOut. Note: Suspend BitLocker before making changes to the DEP configuration. Open a command prompt (cmd.exe) or PowerShell with elevated privileges (Run as administrator). Enter "BCDEDIT /set {current} nx OptOut". (If using PowerShell "{current}" must be enclosed in quotes.) "AlwaysOn", a more restrictive selection, is also valid but does not allow applications that do not function properly to be opted out of DEP. Opted out exceptions can be configured in the "System Properties". Open "System" in Control Panel. Select "Advanced system settings". Click "Settings" in the "Performance" section. Select the "Data Execution Prevention" tab. Applications that are opted out are configured in the window below the selection "Turn on DEP for all programs and services except those I select:".
Additional Identifiers
Rule ID: SV-253283r828933_rule
Vulnerability ID: V-253283
Group Title: SRG-OS-000433-GPOS-00193
Expert Comments
CCIs
Number | Definition |
---|---|
CCI-002794 |
The organization develops an incident response plan. |
CCI-002824 |
The information system implements organization-defined security safeguards to protect its memory from unauthorized code execution. |