Vulnerability Name: | CVE-2019-1385 (CCN-170555) | ||||||||||||
Assigned: | 2018-11-26 | ||||||||||||
Published: | 2019-11-12 | ||||||||||||
Updated: | 2020-08-24 | ||||||||||||
Summary: | An elevation of privilege vulnerability exists when the Windows AppX Deployment Extensions improperly performs privilege management, resulting in access to system files.To exploit this vulnerability, an authenticated attacker would need to run a specially crafted application to elevate privileges.The security update addresses the vulnerability by correcting how AppX Deployment Extensions manages privileges., aka 'Windows AppX Deployment Extensions Elevation of Privilege Vulnerability'. | ||||||||||||
CVSS v3 Severity: | 7.8 High (CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) 6.8 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)
6.8 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)
| ||||||||||||
CVSS v2 Severity: | 6.1 Medium (CVSS v2 Vector: AV:L/AC:L/Au:N/C:P/I:P/A:C)
| ||||||||||||
Vulnerability Type: | CWE-59 | ||||||||||||
Vulnerability Consequences: | Gain Privileges | ||||||||||||
References: | Source: MITRE Type: CNA CVE-2019-1385 Source: XF Type: UNKNOWN ms-windows-cve20191385-priv-esc(170555) Source: CCN Type: Packet Storm Security [11-25-2019] Microsoft Windows AppXsvc Deployment Extension Privilege Escalation Source: CCN Type: Microsoft Security TechCenter - November 2019 Windows Elevation of Privilege Vulnerability Source: MISC Type: Patch, Vendor Advisory https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1385 Source: EXPLOIT-DB Type: EXPLOIT Offensive Security Exploit Database [11-25-2019] Source: CCN Type: ZDI-19-979 Microsoft Windows AppX Deployment Service Hard Link Denial-of-Service Vulnerability Source: MISC Type: Third Party Advisory https://www.zerodayinitiative.com/advisories/ZDI-19-979/ | ||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration CCN 1: Denotes that component is vulnerable | ||||||||||||
BACK |