Microsoft Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, and Windows 10 Gold and 1511 allow attackers to bypass the Secure Boot protection mechanism by leveraging (1) administrative or (2) physical access to install a crafted boot manager, aka "Secure Boot Security Feature Bypass."
References
Link | Resource |
---|---|
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MVB6Y2TVKSOBTIIBRUAJUIH3LQHMHCAG/ | Mailing List Release Notes Third Party Advisory |
http://www.securityfocus.com/bid/92304 | Third Party Advisory VDB Entry |
http://www.securitytracker.com/id/1036573 | Third Party Advisory VDB Entry |
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-100 | Patch Vendor Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Information
Published : 2016-08-09 14:59
Updated : 2019-05-15 10:37
NVD link : CVE-2016-3320
Mitre link : CVE-2016-3320
JSON object : View
CWE
CWE-254
7PK - Security Features
Products Affected
microsoft
- windows_rt_8.1
- windows_8.1
- windows_10
- windows_server_2012
fedoraproject
- fedora