Risk | Low |
Patch available | YES |
Number of vulnerabilities | 1 |
CVE-ID | CVE-2016-3287 |
CWE-ID | CWE-264 |
Exploitation vector | Local |
Public exploit | Public exploit code for vulnerability #1 is available. |
Vulnerable software Subscribe |
Windows Operating systems & Components / Operating system Windows Server Operating systems & Components / Operating system |
Vendor | Microsoft |
Security Bulletin
This security bulletin contains one low risk vulnerability.
EUVDB-ID: #VU120
Risk: Low
CVSSv3.1: 4.6 [CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L/E:P/RL:O/RC:C]
CVE-ID: CVE-2016-3287
CWE-ID:
CWE-264 - Permissions, Privileges, and Access Controls
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to bypass certain security restrictions.
The vulnerability exists due to operating system incorrectly applies affected security policy. A local user with administrative privileges or physical access to computer can disable code integrity checks and allow execution of test-signed executables and drivers.
Successful exploitation of this vulnerability may allow an attacker to gain elevated privileges within the system, access encrypted data, stored on the system, bypass Secure Boot Integrity Validation for BitLocker and the Device Encryption security features.
MitigationInstall updates from Microsoft website.
Vulnerable software versionsWindows: 8.1 - 10
Windows Server: 2012 - 2012 R2
External linkshttp://technet.microsoft.com/en-us/library/security/MS16-094
Q & A
Can this vulnerability be exploited remotely?
No. The attacker should have physical access to the system in order to successfully exploit this vulnerability.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.