MS16-094: Security Update for Secure Boot (3177404)

High Nessus Plugin ID 92025


The remote host is affected by a security bypass vulnerability.


The remote Windows host is missing a security update. It is, therefore, affected by a security bypass vulnerability in the Secure Boot component due to improperly applying an affected policy. An attacker who has either administrative privileges or access to the host can exploit this issue, via installing a crafted policy, to disable code integrity checks, thus allowing test-signed executables and drivers to be loaded on the target host. Moreover, the attacker can exploit this issue to bypass the Secure Boot integrity validation for BitLocker and the device encryption security features.


Microsoft has released a set of patches for Windows 2012, 8.1, RT 8.1, 2012 R2, and 10

See Also

Plugin Details

Severity: High

ID: 92025

File Name: smb_nt_ms16-094.nasl

Version: $Revision: 1.6 $

Type: local

Agent: windows

Published: 2016/07/12

Modified: 2017/07/12

Dependencies: 57033, 13855

Risk Information

Risk Factor: High


Base Score: 9

Temporal Score: 6.7

Vector: CVSS2#AV:N/AC:L/Au:S/C:C/I:C/A:C

Temporal Vector: CVSS2#E:U/RL:OF/RC:C

Vulnerability Information

CPE: cpe:/o:microsoft:windows

Required KB Items: SMB/MS_Bulletin_Checks/Possible

Exploit Available: false

Exploit Ease: No known exploits are available

Patch Publication Date: 2016/07/12

Vulnerability Publication Date: 2016/07/12

Reference Information

CVE: CVE-2016-3287

BID: 91604

OSVDB: 141422

MSFT: MS16-094

MSKB: 3172727, 3163912, 3172985

IAVB: 2016-B-0112