An elevation of privilege vulnerability exists in the way the Task Scheduler Service validates certain file operations. An attacker who successfully exploited the vulnerability could gain elevated privileges on a victim system. To exploit the vulnerability, an attacker would require unprivileged code execution on a victim system. The security update addresses the vulnerability by correctly validating file operations.
2019-06-12T14:29:04.337
2025-10-29T14:39:18.490
Analyzed
CVSSv3.1: 7.8 (HIGH)
AV:L/AC:L/Au:N/C:C/I:C/A:C
3.9
10.0
| Type | Vendor | Product | Version/Range | Vulnerable? |
|---|---|---|---|---|
| Operating System | microsoft | windows_10_1507 | - | Yes |
| Operating System | microsoft | windows_10_1607 | - | Yes |
| Operating System | microsoft | windows_10_1703 | - | Yes |
| Operating System | microsoft | windows_10_1709 | - | Yes |
| Operating System | microsoft | windows_10_1803 | - | Yes |
| Operating System | microsoft | windows_10_1809 | - | Yes |
| Operating System | microsoft | windows_10_1903 | - | Yes |
| Operating System | microsoft | windows_server_1803 | - | Yes |
| Operating System | microsoft | windows_server_1903 | - | Yes |
| Operating System | microsoft | windows_server_2016 | - | Yes |
| Operating System | microsoft | windows_server_2019 | - | Yes |