The kernel in Microsoft Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT Gold and 8.1, and Windows 10 allows physically proximate attackers to bypass the Trusted Boot protection mechanism, and consequently interfere with the integrity of code, BitLocker, Device Encryption, and Device Health Attestation, via a crafted Boot Configuration Data (BCD) setting, aka "Trusted Boot Security Feature Bypass Vulnerability."
References
Link | Resource |
---|---|
http://www.securitytracker.com/id/1033805 | Third Party Advisory VDB Entry |
http://packetstormsecurity.com/files/133962/Microsoft-Trusted-Boot-Security-Feature-Bypass.html | Exploit Third Party Advisory VDB Entry |
http://www.securityfocus.com/archive/1/536678/100/0/threaded | Third Party Advisory VDB Entry |
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-111 | Patch Vendor Advisory |
Configurations
Configuration 1 (hide)
|
Information
Published : 2015-10-13 18:59
Updated : 2019-05-15 11:56
NVD link : CVE-2015-2552
Mitre link : CVE-2015-2552
JSON object : View
CWE
CWE-254
7PK - Security Features
Products Affected
microsoft
- windows_7
- windows_rt_8.1
- windows_vista
- windows_8.1
- windows_10
- windows_server_2008
- windows_8
- windows_rt
- windows_server_2012