First published: Tue Apr 09 2019(Updated: )
An elevation of privilege vulnerability exists in Windows AppX Deployment Server that allows file creation in arbitrary locations. To exploit the vulnerability, an attacker would first have to log on to the system, aka 'Microsoft Windows Elevation of Privilege Vulnerability'.
Credit: secure@microsoft.com
Affected Software | Affected Version | How to fix |
---|---|---|
Microsoft Windows 10 | =1607 | |
Microsoft Windows 10 | =1703 | |
Microsoft Windows 10 | =1709 | |
Microsoft Windows 10 | =1803 | |
Microsoft Windows 10 | =1809 | |
Microsoft Windows Server 2016 | ||
Microsoft Windows Server 2016 | =1709 | |
Microsoft Windows Server 2016 | =1803 | |
Microsoft Windows Server 2019 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-0766 has been rated as important, indicating that it could allow an attacker to gain elevated privileges on the affected systems.
To mitigate CVE-2019-0766, apply the latest security updates provided by Microsoft for the affected Windows versions.
CVE-2019-0766 affects multiple versions of Microsoft Windows 10 and Windows Server, specifically versions 1607, 1703, 1709, 1803, 1809, and Windows Server 2016 and 2019.
CVE-2019-0766 is classified as an elevation of privilege vulnerability that allows for unauthorized file creation in arbitrary locations.
No, exploitation of CVE-2019-0766 requires local access to the affected system.