PC Gamers Face False Alarms from Windows Defender
Recently, PC gamers found themselves navigating an unexpected hurdle as Windows Defender issued alerts related to a kernel-level driver known as WinRing0. This driver, integral to various hardware monitoring applications, was mistakenly flagged as a potential threat, leading to erratic behavior in some systems. For example, fan control applications were notably affected, causing fans to spin at high speeds after the tool was quarantined. It’s important to clarify that this incident was not a security breach but rather a false alarm triggered by Windows Defender’s detection of WinRing0 in applications such as Fan Control, Razer Synapse, and SteelSeries Engine.
WinRing0 serves as a kernel-level driver that enables these applications to interact with hardware components like fans and LED lights. Its widespread use stems from its ability to provide developers with access to hardware functionalities that are typically restricted within the Windows operating system. Adam Honse, the developer behind OpenRGB, emphasized the significance of WinRing0, stating, “There are only two freely available Windows drivers I know of that are capable of accessing the SMBus registers we need to be able to control LEDs: InpOut32 and WinRing0.” OpenRGB transitioned to WinRing0 after encountering conflicts with Riot’s Vanguard anti-cheat software when using InpOut32.
Microsoft’s decision to flag WinRing0 has placed developers in a challenging position. The company mandates that drivers be digitally signed, a requirement that can be prohibitively expensive for many open-source projects. Honse expressed concern over this, noting, “It is not feasible to demand not-for-profit hobby [free open-source software] projects to pay the same costs for driver signing as for-profit companies.” Consequently, some developers are exploring alternative solutions, including the development of proprietary drivers, although this approach demands substantial resources.
For instance, SignalRGB has opted to create its own proprietary SMBus driver to replace WinRing0. However, this route is not practical for smaller projects due to the extensive engineering resources required. Timothy Sun from SignalRGB candidly remarked, “I won’t sugarcoat it – the development process was challenging and required significant engineering resources.”
In response to the situation, Microsoft has acknowledged the issue and is currently reassessing its detection logic to minimize false positives, according to Scott Woodgate, the company’s General Manager of Threat Protection. While the investigation is ongoing, some developers propose that addressing the vulnerability within WinRing0 itself might be a more straightforward solution. However, obtaining a patched version that is signed by Microsoft poses its own set of challenges due to the associated costs.
There is a glimmer of hope on the horizon. iBuyPower, a manufacturer of prebuilt gaming PCs, is planning to secure an updated and signed version of WinRing0 to distribute among developers. This initiative could offer a cost-effective remedy for many applications impacted by the alerts. Robert Teller, product director at Hyte, stated, “If this solution works, we’ll share our updated and signed version of the library so the community of developers can distribute new versions of their apps with validated Microsoft drivers.”
In the interim, users of the affected software may need to update their applications or configure exceptions in Windows Defender to ensure continued functionality. Notably, Razer and SteelSeries have already transitioned away from using WinRing0 in their latest software iterations, although this shift may lead to some loss of functionality.