Rapid7 Vulnerability & Exploit Database

MS16-140: Security Update for Boot Manager (3193479)

Free InsightVM Trial No Credit Card Necessary
2024 Attack Intel Report Latest research by Rapid7 Labs
Back to Search

MS16-140: Security Update for Boot Manager (3193479)

Severity
5
CVSS
(AV:N/AC:L/Au:N/C:N/I:P/A:N)
Published
11/08/2016
Created
07/25/2018
Added
11/08/2016
Modified
11/18/2021

Description

A security feature bypass vulnerability exists when Windows Secure Boot improperly loads a boot policy that is affected by the vulnerability. An attacker who successfully exploited this vulnerability could disable code integrity checks, allowing test-signed executables and drivers to be loaded onto a target device.

Solution(s)

  • WINDOWS-HOTFIX-MS16-142-243a2ce9-3071-4a8a-8fdb-08a9f36bd36a
  • WINDOWS-HOTFIX-MS16-142-25bb083e-21f1-46cf-9000-124c57cf8568
  • WINDOWS-HOTFIX-MS16-142-2fde341c-622e-4189-b807-3b3798fbcc23
  • WINDOWS-HOTFIX-MS16-142-31c27622-134b-41c9-8868-12932e358864
  • WINDOWS-HOTFIX-MS16-142-4dff0e5a-d647-4104-a376-54165c691598
  • WINDOWS-HOTFIX-MS16-142-58111ec9-bb9f-48be-903c-f2588bfe68ec
  • WINDOWS-HOTFIX-MS16-142-67f7223a-468a-41e8-9217-c856c369ebad
  • WINDOWS-HOTFIX-MS16-142-73d9f61c-7c3b-4fb1-a2ff-39fcfbccc688
  • WINDOWS-HOTFIX-MS16-142-81335179-bd72-4e7c-955c-2304fb3ad889
  • WINDOWS-HOTFIX-MS16-142-8f6c6c50-e2ba-4f4f-97a8-489d597f806a
  • WINDOWS-HOTFIX-MS16-142-d5815022-1c24-4e0e-850b-e42f5b2f25b9
  • WINDOWS-HOTFIX-MS16-142-daf935d1-102b-402d-8fea-fc69a84e3ea6
  • WINDOWS-HOTFIX-MS16-142-de8d98fe-7f2b-4ee6-adc3-6be64fc1fc8d

insightVM

Advanced vulnerability management analytics and reporting.
Key Features
  • Lightweight Endpoint Agent
  • Live Dashboards
  • Real Risk Prioritization
  • IT-Integrated Remediation Projects
  • Cloud, Virtual, and Container Assessment
  • Integrated Threat Feeds
  • Easy-to-Use RESTful API
  • Automation-Assisted Patching
  • Automated Containment
Free InsightVM Trial View All Features

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;