An elevation of privilege vulnerability exists in the way the Task Scheduler Service validates certain file operations. An attacker who successfully exploited the vulnerability could gain elevated privileges on a victim system. To exploit the vulnerability, an attacker would require unprivileged code execution on a victim system. The security update addresses the vulnerability by correctly validating file operations.
2019-06-12T14:29:04.337
2025-05-21T18:33:02.230
Analyzed
CVSSv3.1: 7.8 (HIGH)
AV:L/AC:L/Au:N/C:C/I:C/A:C
3.9
10.0
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Operating System | microsoft | windows_10_1507 | - | Yes |
Operating System | microsoft | windows_10_1607 | - | Yes |
Operating System | microsoft | windows_10_1703 | - | Yes |
Operating System | microsoft | windows_10_1709 | - | Yes |
Operating System | microsoft | windows_10_1803 | - | Yes |
Operating System | microsoft | windows_10_1809 | - | Yes |
Operating System | microsoft | windows_10_1903 | - | Yes |
Operating System | microsoft | windows_server_1803 | - | Yes |
Operating System | microsoft | windows_server_1903 | - | Yes |
Operating System | microsoft | windows_server_2016 | - | Yes |
Operating System | microsoft | windows_server_2019 | - | Yes |