CVE-2016-7271

The Secure Kernel Mode implementation in Microsoft Windows 10 Gold, 1511, and 1607 and Windows Server 2016 allows local users to bypass the virtual trust level (VTL) protection mechanism via a crafted application, aka "Secure Kernel Mode Elevation of Privilege Vulnerability."
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_10:1511:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*

History

21 Nov 2024, 02:57

Type Values Removed Values Added
References () http://www.securityfocus.com/bid/94734 - () http://www.securityfocus.com/bid/94734 -
References () http://www.securitytracker.com/id/1037451 - () http://www.securitytracker.com/id/1037451 -
References () https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-150 - () https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-150 -

Information

Published : 2016-12-20 06:59

Updated : 2024-11-21 02:57


NVD link : CVE-2016-7271

Mitre link : CVE-2016-7271

CVE.ORG link : CVE-2016-7271


JSON object : View

Products Affected

microsoft

  • windows_10
  • windows_server_2016
CWE
CWE-264

Permissions, Privileges, and Access Controls