Network Security, Patch/Configuration Management, Vulnerability Management

Workaround created to defeat Microsoft Win 7, 8 security patch block


A Github user has published an open-source workaround that purportedly circumvents Microsoft's new block on receiving security updates for systems running Windows 7 or 8.1 on a PC powered by a sixth-generation processor.

Github poster Zeffy, wrote of inspiration to create the patch when reading about Microsoft's plan to block updates for machines running Intel, AMD and Qualcomm sixth-generation processors. Microsoft wrote on its support site the reason for its move is that the two operating systems in question do not run well on the most modern processors available.

Zeffy's solution was to look for the line of code that identified the newer processors and skip it.

“Luckily, there are a couple of different ways to kill this CPU check by patching wuaueng.dll. Change the value of dword_600002EE948 (see this line) which is at file offset 0x26C948, from 0x01 to 0x00. This makes IsDeviceServiceable(void) skip over the entire CPU check and immediately return the value stored at dword_600002EE94C, which by default is 1 (supported CPU). This is my preferred method, as it is a simple 1-byte change,” Zeffy wrote on Github.

Get daily email updates

SC Media's daily must-read of the most current and pressing daily news

By clicking the Subscribe button below, you agree to SC Media Terms and Conditions and Privacy Policy.