CVE-2019-0986

EUVD-2019-1717
An elevation of privilege vulnerability exists when the Windows User Profile Service (ProfSvc) improperly handles symlinks. An attacker who successfully exploited this vulnerability could delete files and folders in an elevated context.
To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that could exploit the vulnerability and delete files or folders of their choosing.
The security update addresses the vulnerability by correcting how the Windows User Profile Service handles symlinks.
Link Following
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
6.3 MEDIUM
LOCAL
HIGH
LOW
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H
microsoftCNA
6.3 MEDIUM
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H/E:P/RL:O/RC:C
Base Score
CVSS 3.x
EPSS Score
Percentile: 87%
Affected Products (NVD)
VendorProductVersion
microsoftwindows_10
-
microsoftwindows_7
-
microsoftwindows_8.1
-
microsoftwindows_rt_8.1
-
microsoftwindows_server_2008
-
microsoftwindows_server_2012
-
microsoftwindows_server_2016
-
microsoftwindows_server_2019
-
𝑥
= Vulnerable software versions
Windows Releases
Platform
Version
Windows 10
(x64, x86)
1607 (x64, x86)
1703 (x64, x86)
1709 (arm64, x64, x86)
1803 (arm64, x64, x86)
1809 (arm64, x64, x86)
1903 (arm64, x64, x86)
Windows 7
Service Pack 1 (x64, x86)
Windows 8.1
(x64, x86)
Windows RT 8.1
All
Windows Server
1803 Server Core
1903 Server Core
Windows Server 2008
Service Pack 2 (x64, x86)
Service Pack 2 Server Core (x64, x86)
Windows Server 2008 R2
Service Pack 1 (x64)
Service Pack 1 Server Core (x64)
Windows Server 2012
Server Core
Standard
Windows Server 2012 R2
Server Core
Standard
Windows Server 2016
Server Core
Standard
Windows Server 2019
Server Core
Standard