Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2016.1723 MS16-094 - Important: Security Update for Secure Boot (3177404) 13 July 2016 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: Microsoft Windows Publisher: Microsoft Operating System: Windows 8.1 Windows Server 2012 Windows Server 2012 R2 Windows RT 8.1 Windows 10 Impact/Access: Unauthorised Access -- Existing Account Resolution: Patch/Upgrade CVE Names: CVE-2016-3287 Original Bulletin: https://technet.microsoft.com/en-us/library/security/MS16-094 - --------------------------BEGIN INCLUDED TEXT-------------------- Microsoft Security Bulletin MS16-094 - Important Security Update for Secure Boot (3177404) Published: July 12, 2016 Version: 1.0 Executive Summary This security update resolves a vulnerability in Microsoft Windows. The vulnerability could allow Secure Boot security features to be bypassed if an attacker installs an affected policy on a target device. An attacker must have either administrative privileges or physical access to install a policy and bypass Secure Boot. This security update is rated Important for all supported editions of Windows 8.1, Windows RT 8.1, Windows Server 2012, Windows Server 2012 R2, and Windows 10. Affected Software Windows 8.1 Windows Server 2012 Windows Server 2012 R2 Windows RT 8.1 Windows 10 Windows Server 2012 (Server Core installation) Windows Server 2012 R2 (Server Core installation) Vulnerability Information Secure Boot Security Feature Bypass Vulnerability CVE-2016-3287 A security feature bypass vulnerability exists when Windows Secure Boot improperly applies an affected policy. An attacker who successfully exploited this vulnerability could disable code integrity checks, allowing test-signed executables and drivers to be loaded on a target device. In addition, an attacker could bypass the Secure Boot Integrity Validation for BitLocker and the Device Encryption security features. To exploit the vulnerability, an attacker must either gain administrative privileges or physical access to a target device to install an affected policy. The security update addresses the vulnerability by blacklisting affected policies. The following table contains links to the standard entry for each vulnerability in the Common Vulnerabilities and Exposures list: Vulnerability title CVE number Publicly disclosed Exploited Secure Boot Security Feature Bypass Vulnerability CVE-2016-3287 Yes No - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: http://www.auscert.org.au/render.html?cid=1980 =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBV4WXBIx+lLeg9Ub1AQigihAAkfrzXqesehtfiMU16Oza/+FecWnGdfiP 6EIdiJH88ULcY7dbmMSUvAB7KKTWrbRpCGTt5o6+WUjedo4aGT0h7JGGbxI7eNQl tD+zleOQQfk8lrOCMDXrCe/Vd5miPuy97vmprELiKWRwycJfFtbR1JFlkQGgbKo9 VXPKZbNqTLx6cTXWRrskUftGUar15RUlwPu4E0LLn2CBDybf8iu7nz4xhrod+4Hp h1G0e2m3dhjC5oliKMDbcb3uca4omKxLVaMjX6riJNIBhCf7wgveOeFcMOUtNy6F UPc8uNWaRQ3gJ+tDMPLK2XrVuLiT3xq8ZtMpI9aGHqZllEkMYiu7deuE4qVz05Jh 0Li0BmSjkAWakxRDy0RYftJ6iHP8xdFEWZGdfjjZ5y8EyHoZEhw+FUqN5XnUkVZ0 HCGgg49igjgXGGKyVtowJ3KiucIwDwB0loUAOhfyjqVKcTlEDZ5c3l7ZJMGjgkVF 5LOg1UzoG+eqMrA8eVBZ8UX5P2Z85hNoOoeF72zcEU5ad7NGD//V1sxJitv3mwwi aei4EAv3qcHGtZAG5Re5lsJ5IClpq27nw7lf4yKd3t5mjzP9UHbQ54lDxR58Ui2O hTPAPz+cQeTYKSUz76B84B6FZFtK/CSMJg1KyYZyElEggy3rm9tfXwCeZP2nTd4k a2bBJf2CM9I= =hCHa -----END PGP SIGNATURE-----