MS16-066: Security Update for Virtual Secure Mode (3155451)

This script is Copyright (C) 2016-2017 Tenable Network Security, Inc.


Synopsis :

The remote Windows host is affected by a security feature bypass
vulnerability.

Description :

The remote Windows host is missing a security update. It is,
therefore, affected by a security feature bypass vulnerability due to
certain kernel-mode pages being marked as RWX (Read, Write, Execute)
even when Hypervisor Code Integrity (HVCI) is enabled. An attacker
can exploit this vulnerability, via a specially crafted application,
to bypass code integrity protections.

See also :

https://technet.microsoft.com/library/security/MS16-066

Solution :

Microsoft has released a set of patches for Windows 10.

Risk factor :

Low / CVSS Base Score : 2.1
(CVSS2#AV:L/AC:L/Au:N/C:N/I:P/A:N)
CVSS Temporal Score : 1.6
(CVSS2#E:U/RL:OF/RC:C)
Public Exploit Available : false

Family: Windows : Microsoft Bulletins

Nessus Plugin ID: 91015 ()

Bugtraq ID: 90048

CVE ID: CVE-2016-0181

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now