7.2
CVSSv2

CVE-2015-2552

Published: 14/10/2015 Updated: 15/05/2019
CVSS v2 Base Score: 7.2 | Impact Score: 10 | Exploitability Score: 3.9
VMScore: 641
Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

The kernel in Microsoft Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT Gold and 8.1, and Windows 10 allows physically proximate malicious users to bypass the Trusted Boot protection mechanism, and consequently interfere with the integrity of code, BitLocker, Device Encryption, and Device Health Attestation, via a crafted Boot Configuration Data (BCD) setting, aka "Trusted Boot Security Feature Bypass Vulnerability."

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

microsoft windows rt -

microsoft windows server 2012 -

microsoft windows server 2008 r2

microsoft windows server 2008 -

microsoft windows server 2012 r2

microsoft windows 8.1 -

microsoft windows 8 -

microsoft windows 10 -

microsoft windows rt 8.1 -

microsoft windows 7 -

microsoft windows vista -

Exploits

An attacker with administrative access to a Windows machine with UEFI Secure Boot enabled may bypass code signing policy checks by putting intentionally-malformed configuration options in the boot configuration database (BCD) ...

Github Repositories

nyā

meow meow is an on-the-fly PatchGuard disabler for Windows 81 and RT which does not depends on magic values specific to build versions A related blog entry can be found here: standa-noteblogspotca/2015/10/some-tips-to-analyze-patchguardhtml If you are targeting Windows 7 or older, you can use DisPG instead Important This prog