CVE-2019-1069

EUVD-2019-9651
An elevation of privilege vulnerability exists in the way the Task Scheduler Service validates certain file operations. An attacker who successfully exploited the vulnerability could gain elevated privileges on a victim system.
To exploit the vulnerability, an attacker would require unprivileged code execution on a victim system.
The security update addresses the vulnerability by correctly validating file operations.
Link Following
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
7.8 HIGH
LOCAL
LOW
LOW
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
microsoftCNA
7.8 HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C
Base Score
CVSS 3.x
EPSS Score
Percentile: 96%
Affected Products (NVD)
VendorProductVersion
microsoftwindows_10_1507
-
microsoftwindows_10_1607
-
microsoftwindows_10_1703
-
microsoftwindows_10_1709
-
microsoftwindows_10_1803
-
microsoftwindows_10_1809
-
microsoftwindows_10_1903
-
microsoftwindows_server_1803
-
microsoftwindows_server_1903
-
microsoftwindows_server_2016
-
microsoftwindows_server_2019
-
𝑥
= Vulnerable software versions
Windows Releases
Platform
Version
Windows 10
(x64, x86)
1607 (x64, x86)
1703 (x64, x86)
1709 (arm64, x64, x86)
1803 (arm64, x64, x86)
1809 (arm64, x64, x86)
1903 (arm64, x64, x86)
Windows Server
1803 Server Core
1903 Server Core
Windows Server 2016
Server Core
Standard
Windows Server 2019
Server Core
Standard