CVE-2019-1069

An elevation of privilege vulnerability exists in the way the Task Scheduler Service validates certain file operations. An attacker who successfully exploited the vulnerability could gain elevated privileges on a victim system.
To exploit the vulnerability, an attacker would require unprivileged code execution on a victim system.
The security update addresses the vulnerability by correctly validating file operations.
Link Following
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
7.8 HIGH
LOCAL
LOW
LOW
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Base Score
CVSS 3.x
EPSS Score
Percentile: Unknown
Affected Products (NVD)
VendorProductVersion
microsoftwindows_10_1507
-
microsoftwindows_10_1607
-
microsoftwindows_10_1703
-
microsoftwindows_10_1709
-
microsoftwindows_10_1803
-
microsoftwindows_10_1809
-
microsoftwindows_10_1903
-
microsoftwindows_server_1803
-
microsoftwindows_server_1903
-
microsoftwindows_server_2016
-
microsoftwindows_server_2019
-
𝑥
= Vulnerable software versions
Early Detection
Affected products identified ahead of NVD analysis through intelligence sources.
VendorProductVersionSource
microsoftwindows_server_2019
𝑥
< *
ADP
Windows Releases
Platform
Version
Windows 10
(x64, x86)
1607 (x64, x86)
1703 (x64, x86)
1709 (arm64, x64, x86)
1803 (arm64, x64, x86)
1809 (arm64, x64, x86)
1903 (arm64, x64, x86)
Windows Server
1803 Server Core
1903 Server Core
Windows Server 2016
Server Core
Standard
Windows Server 2019
Server Core
Standard