MS16-100: Security Update for Secure Boot (3179577)

High Nessus Plugin ID 92822


The remote Windows host is affected by a security bypass vulnerability.


The remote Windows host is missing a security update. It is, therefore, affected by a security bypass vulnerability in Secure Boot due to improper handling of malicious boot managers. An attacker with administrative privileges can exploit this vulnerability to bypass code integrity checks and load test-signed executables and drivers.


Microsoft has released a set of patches for Windows 2012, 8.1, RT 8.1, 2012 R2, and 10. Alternatively, as a workaround, configure BitLocker to use Trusted Platform Module (TPM)+PIN protection or disable Secure Boot integrity protection of BitLocker per the vendor advisory.

See Also

Plugin Details

Severity: High

ID: 92822

File Name: smb_nt_ms16-100.nasl

Version: $Revision: 1.6 $

Type: local

Agent: windows

Published: 2016/08/09

Modified: 2017/07/12

Dependencies: 57033, 13855

Risk Information

Risk Factor: High


Base Score: 9

Temporal Score: 6.7

Vector: CVSS2#AV:N/AC:L/Au:S/C:C/I:C/A:C

Temporal Vector: CVSS2#E:U/RL:OF/RC:C


Base Score: 7.2

Vector: CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

Vulnerability Information

CPE: cpe:/o:microsoft:windows

Required KB Items: SMB/MS_Bulletin_Checks/Possible

Exploit Available: false

Exploit Ease: No known exploits are available

Patch Publication Date: 2016/08/09

Vulnerability Publication Date: 2016/08/09

Reference Information

CVE: CVE-2016-3320

BID: 92304

OSVDB: 142729

MSFT: MS16-100

MSKB: 3172729

IAVB: 2016-B-0122