Skip to content

Commit 313e32a

Browse files
authored
Merge pull request #3139 from denisebmsft/docs-editor/criteria-1741967299
Update criteria.md
2 parents 0d57209 + ca38c2a commit 313e32a

File tree

1 file changed

+2
-2
lines changed

1 file changed

+2
-2
lines changed

unified-secops-platform/criteria.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ ms.collection:
1212
- m365-security
1313
- tier2
1414
ms.topic: conceptual
15-
ms.date: 10/30/2024
15+
ms.date: 03/13/2025
1616
search.appverid: met150
1717
---
1818

@@ -219,4 +219,4 @@ Vulnerable software is an application or code that has security flaws or weaknes
219219

220220
### Vulnerable drivers
221221

222-
Despite strict requirements and reviews imposed on code running in kernel, device drivers remain susceptible to various types of vulnerabilities and bugs. Examples include memory corruption and arbitrary read and write bugs, which can be exploited by attackers to execute more significant malicious and destructive actions -– actions typically restricted in user mode. Terminating critical processes on a device is an example of such malicious action.
222+
Despite strict requirements and reviews imposed on code running in kernel, device drivers remain susceptible to various types of vulnerabilities and bugs , including intentional design oversights that undermine the security promise of the operating system . Examples include memory corruption and arbitrary read and write bugs, which can be exploited by attackers to execute more significant malicious and destructive actions -– actions typically restricted in user mode. Terminating critical processes on a device is an example of such malicious action.

0 commit comments

Comments
 (0)