Microsoft Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, and Windows 10 Gold and 1511 allow attackers to bypass the Secure Boot protection mechanism by leveraging (1) administrative or (2) physical access to install a crafted boot manager, aka "Secure Boot Security Feature Bypass."
References
Link | Resource |
---|---|
http://www.securityfocus.com/bid/92304 | Third Party Advisory VDB Entry |
http://www.securitytracker.com/id/1036573 | Third Party Advisory VDB Entry |
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-100 | Patch Vendor Advisory |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MVB6Y2TVKSOBTIIBRUAJUIH3LQHMHCAG/ |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
No history.
Information
Published : 2016-08-09 21:59
Updated : 2023-11-07 02:32
NVD link : CVE-2016-3320
Mitre link : CVE-2016-3320
CVE.ORG link : CVE-2016-3320
JSON object : View
Products Affected
microsoft
- windows_server_2012
- windows_8.1
- windows_10
- windows_rt_8.1
fedoraproject
- fedora
CWE
CWE-254
7PK - Security Features