This script is Copyright (C) 2016-2017 Tenable Network Security, Inc.
The remote Windows host is affected by a security feature bypass
The remote Windows host is missing a security update. It is,
therefore, affected by a security feature bypass vulnerability due to
certain kernel-mode pages being marked as RWX (Read, Write, Execute)
even when Hypervisor Code Integrity (HVCI) is enabled. An attacker
can exploit this vulnerability, via a specially crafted application,
to bypass code integrity protections.
See also :
Microsoft has released a set of patches for Windows 10.
Risk factor :
Low / CVSS Base Score : 2.1
CVSS Temporal Score : 1.6
Public Exploit Available : false