Copy-Paste Pitfalls: Revealing the AppLocker Bypass Risks in The Suggested Block-list Policy 

A subtle versioning error in Microsoft’s AppLocker block list exposes a bypass risk — learn how to spot and fix this overlooked security gap.
2 min read
Last updated July 17, 2025
AppLocker Bypass

AppLocker is a Microsoft security feature that helps control which applications and files can run on Windows systems, ensuring compliance and preventing malicious activity. 
In addition to AppLocker, Microsoft published a block list, with applications that can bypass AppLocker configuration.

Executive summary 

While reviewing Microsoft’s suggested configuration, Varonis Threat Labs noticed a subtle but important issue: the MaximumFileVersion field was set to 65355 instead of the expected 65535.  

This small discrepancy could allow certain files to bypass restrictions.  

For example, an attacker can modify a 'blocked' executable's version to exceed the 'maximum' version, allowing it to run and bypass the restrictions. 

While not a critical vulnerability — since a "signed executables only" rule would still block such attempts — this highlights the importance of carefully reviewing and updating security policies for organizations so they can close potential gaps and align with best practices. 

The beginning — what is AppLocker 

AppLocker is Microsoft's enterprise-grade application control solution that helps administrators control which applications and files users can run on their Windows systems.  

Think of it as a bouncer at a club, checking IDs and deciding who gets in and who doesn't. However, instead of people, it's blocking executables, scripts, and DLLs. Organizations use AppLocker to prevent malware, maintain compliance, and keep users from installing that sketchy "free" photo editor they found online. 

Get started with our world-famous Data Risk Assessment.
Get your assessment
inline-cp

AppLocker enforces rules such as allow this and block that. It can be incredibly effective when configured properly, but like any security tool, it's only as good as its implementation. And that's where this little adventure begins. 

While exploring different attack surfaces on AppLocker, we found an article from Microsoft, “Applications that can bypass App control” this page. 

The article is a live resource listing all known Microsoft-signed executables that attackers can use to execute code, effectively sidestepping AppLocker restrictions. It’s regularly updated with the latest discoveries. A big shout-out to Microsoft for maintaining such a valuable repository. 

Most of the lines look like this:   

	
		

<Deny ID="ID_DENY_BASH" FriendlyName="bash.exe" FileName="bash.exe" MinimumFileVersion="0.0.0.0"MaximumFileVersion="65355.65355.65355.65355" />

 

At first glance, it seems pretty straightforward: a file name, a friendly name, plus the minimum and maximum version fields. But while digging around, something about this line made us pause and scratch our heads. It took a couple of hours to pinpoint exactly what was going on. 

The discovery — how to bypass the policy 

In the example above, the “MaximumFileVersion” field is set to 65355.65355.65355.65355, which might look like a max integer value, but note the difference: 65535 is the maximum value for an unsigned 16-bit integer, and it’s not the 65355 used by the policy.  

What does this mean? In effect, you can bypass the policy by assigning any file version between 65355.65355.65355.65355 and 65535.65535.65535.65535 — slipping right through that gap. 

Is this a real “Super Mega Zero Day?” 

Unfortunately, no... 

This policy is meant to be paired with one that only allows signed executables on the system, filling the gap for any potential malicious intent. When you change the file version, it will also 'break' the file signature, so that you’ll still be blocked by the broader “signed executables only” rule. 

Still, it’s a good reminder that details matter. 

Where did 65355 come from? 

After some digging, it turns out that the likely source was a mistake in Microsoft’s Publish Page documentation. You can see the error in the cached version 

As a result of our report to Microsoft about the discovery, it has since been corrected in the live version.

The takeaways 

While not a critical discovery, the AppLocker finding brings important best practices to the surface: 

  • Avoid copy-pasting without double-checking 
  • If you use this policy, consider updating the MaximumFileVersion to a safer upper limit 
  • Details matter — especially in security 

What should I do now?

Below are three ways you can continue your journey to reduce data risk at your company:

1

Schedule a demo with us to see Varonis in action. We'll personalize the session to your org's data security needs and answer any questions.

2

See a sample of our Data Risk Assessment and learn the risks that could be lingering in your environment. Varonis' DRA is completely free and offers a clear path to automated remediation.

3

Follow us on LinkedIn, YouTube, and X (Twitter) for bite-sized insights on all things data security, including DSPM, threat detection, AI security, and more.

Try Varonis free.

Get a detailed data risk report based on your company’s data.
Deploys in minutes.

Keep reading

Varonis tackles hundreds of use cases, making it the ultimate platform to stop data breaches and ensure compliance.

take-it-easy:-how-attackers-use-ai-and-no-code-tools-with-m365-for-
Take it Easy: How Attackers use AI and No-Code Tools with M365 for "Native Phishing"
A real-world look at how attackers use OneNote, OneDrive, and AI/no-code tools like Flazio for phishing, and practical steps to defend your organization today.
behind-the-making-of-operation-frostbyte:-the-first-snowflake-goat
Behind the Making of Operation Frostbyte: The First Snowflake GOAT
Complete Operation Frostbyte, an interactive mission created by Varonis Threat Labs to test the cybersecurity community’s Snowflake data security knowledge.
multi-cloud-identity:-what-to-consider 
Multi-Cloud Identity: What to Consider 
Learn about enhancing multi-cloud security with authentication, access intelligence, automated remediation, unified monitoring, and compliance best practices.