Логотип exploitDog
bind:CVE-2015-2552
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2015-2552

Количество 3

Количество 3

nvd логотип

CVE-2015-2552

больше 10 лет назад

The kernel in Microsoft Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT Gold and 8.1, and Windows 10 allows physically proximate attackers to bypass the Trusted Boot protection mechanism, and consequently interfere with the integrity of code, BitLocker, Device Encryption, and Device Health Attestation, via a crafted Boot Configuration Data (BCD) setting, aka "Trusted Boot Security Feature Bypass Vulnerability."

CVSS2: 7.2
EPSS: Низкий
github логотип

GHSA-mphq-mc55-vc9w

больше 3 лет назад

The kernel in Microsoft Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT Gold and 8.1, and Windows 10 allows physically proximate attackers to bypass the Trusted Boot protection mechanism, and consequently interfere with the integrity of code, BitLocker, Device Encryption, and Device Health Attestation, via a crafted Boot Configuration Data (BCD) setting, aka "Trusted Boot Security Feature Bypass Vulnerability."

EPSS: Низкий
fstec логотип

BDU:2015-11688

больше 10 лет назад

Уязвимость операционной системы Windows, позволяющая нарушителю обойти защитный механизм доверенной загрузки

CVSS2: 6.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2015-2552

The kernel in Microsoft Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT Gold and 8.1, and Windows 10 allows physically proximate attackers to bypass the Trusted Boot protection mechanism, and consequently interfere with the integrity of code, BitLocker, Device Encryption, and Device Health Attestation, via a crafted Boot Configuration Data (BCD) setting, aka "Trusted Boot Security Feature Bypass Vulnerability."

CVSS2: 7.2
1%
Низкий
больше 10 лет назад
github логотип
GHSA-mphq-mc55-vc9w

The kernel in Microsoft Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT Gold and 8.1, and Windows 10 allows physically proximate attackers to bypass the Trusted Boot protection mechanism, and consequently interfere with the integrity of code, BitLocker, Device Encryption, and Device Health Attestation, via a crafted Boot Configuration Data (BCD) setting, aka "Trusted Boot Security Feature Bypass Vulnerability."

1%
Низкий
больше 3 лет назад
fstec логотип
BDU:2015-11688

Уязвимость операционной системы Windows, позволяющая нарушителю обойти защитный механизм доверенной загрузки

CVSS2: 6.8
1%
Низкий
больше 10 лет назад

Уязвимостей на страницу