Hypervisor code integrity security feature bypass vulnerability in Windows - MS16-066ID: oval:org.secpod.oval:def:34309 | Date: (C)2016-05-11 (M)2024-03-06 |
Class: PATCH | Family: windows |
The host is missing an important security update according to Microsoft security bulletin, MS16-066. The update is required to fix a hypervisor code integrity security feature bypass vulnerability. A flaw is present in the application, which incorrectly allows certain kernel-mode pages to be marked as Read, Write, Execute (RWX) even with Hypervisor Code Integrity (HVCI) enabled. Successful exploitation could allow attackers to bypass code integrity protections.
Platform: |
Microsoft Windows 10 |
Product: |
Microsoft Hyper-V Server |