First published: Tue Apr 09 2019(Updated: )
An elevation of privilege vulnerability exists in Windows when the Win32k component fails to properly handle objects in memory, aka 'Win32k Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2019-0808.
Credit: secure@microsoft.com secure@microsoft.com
Affected Software | Affected Version | How to fix |
---|---|---|
Microsoft Windows 10 | ||
Microsoft Windows 10 | =1607 | |
Microsoft Windows 10 | =1703 | |
Microsoft Windows 10 | =1709 | |
Microsoft Windows 10 | =1803 | |
Microsoft Windows 10 | =1809 | |
Microsoft Windows 8.1 | ||
Microsoft Windows RT | ||
Microsoft Windows Server | ||
Microsoft Windows Server | =r2 | |
Microsoft Windows Server 2016 | ||
Microsoft Windows Server 2016 | =1709 | |
Microsoft Windows Server 2016 | =1803 | |
Microsoft Windows Server 2019 | ||
Microsoft Win32 Kernel Subsystem |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-0797 has a severity rating of important as it allows elevation of privilege on affected Windows systems.
To resolve CVE-2019-0797, ensure that you apply the latest security updates released by Microsoft for your Windows operating system.
CVE-2019-0797 affects Microsoft Windows 10, Windows 8.1, and various versions of Windows Server, including 2012, 2016, and 2019.
CVE-2019-0797 exploits an elevation of privilege vulnerability in the Win32k component of Windows.
As of now, there is no known workaround for CVE-2019-0797 other than applying the provided security updates.