Press Release

MWR Develops OS Kernel Fuzzer

MWR InfoSecurity has today confirmed it has developed a new kernel fuzzer implemented to run across Microsoft Windows and POSIX based operating systems.

MWR’s kernel fuzzer allows the security community to identify and report vulnerabilities quickly and efficiently, lowering the attack surface and further securing all current operating systems deployed across enterprises.

Speaking about the need for MWR’s OS agnostic fuzzer, James Loureiro – Security Researcher at MWR InfoSecurity said, “As the most fundamental part of an operating system, kernels are often targeted by attackers, particularly when attempting to escalate privileges. Recognizing this, sandboxes are now widely shipped by default in major browsers. This technology helps to prevent attackers from escalating their privileges should they compromise the browser.

Kernel exploits can potentially be leveraged to break out of the sandboxed environment, giving an attacker unrestricted access to the host machine. While there are other toolsets that look for kernel vulnerabilities, they’re limited by operating system. MWR’s kernel fuzzer is platform agnostic, working across Windows and POSIX kernels to find vulnerabilities. Any vulnerabilities identified by MWR are reported to the affected vendors to improve the operating system’s security.”

Eliminating operating system vulnerabilities is the end goal - but it’s an ongoing challenge. MWR’s kernel fuzzer helps to address this by generating test cases in search of potentially exploitable vulnerabilities in the operating system.

The kernel fuzzer is designed to be highly distributed allowing quick identification of vulnerabilities.

Georgi Geshev, a Security Researcher with MWR added, “Using the fuzzer, we’ve been able to identify a number of critical vulnerabilities - particularly in Windows 7. We will be working with the affected vendors to help them address these issues under our responsible disclosure policy so patches can be developed and released to the public.”

The core framework plus Windows examples can be found here.

Slides from James and Georgi's presentation at Def Con 24 can be found here.



Accreditations & Certificates

MWR is an accredited member of The Cyber Security Incident Response Scheme (CSIR) approved by CREST (Council of Registered Ethical Security Testers).
MWR is certified under the Cyber Incident Response (CIR) scheme to deal with sophisticated targeted attacks against networks of national significance.
We are certified to comply with ISO 9001 and 14001 in the UK, internationally accepted standards that outline how to put an effective quality and environmental management systems in place.
MWR is certified to comply with ISO 27001 to help ensure our client information is managed securely.
As an Approved Scanning Vendor MWR is approved by PCI SSC to conduct external vulnerability scanning services to PCI DSS Requirement 11.2.2.
We are members of the Council of Registered Ethical Security Testers (CREST), an organisation serving the needs of the information security sector.
MWR is a supplier to the Crown Commercial Service (CCS), which provides commercial and procurement services to the UK public sector.
MWR is a Qualified Security Assessor, meaning we have been qualified by PCI to validate other organisation's adherence to PCI DSS.
As members of CHECK we are measured against high standards set by NCSC for the services we provide to Her Majesty's Government.
MWR’s consultants hold Certified Simulated Attack Manager (CCSAM) and Certified Simulated Attack Specialist (CCSAS) qualifications and are authorized by CREST to perform STAR penetration testing services.