First published: Wed Jun 12 2019(Updated: )
An elevation of privilege vulnerability exists when Windows AppX Deployment Service (AppXSVC) improperly handles hard links, aka 'Windows Elevation of Privilege Vulnerability'.
Credit: secure@microsoft.com secure@microsoft.com
Affected Software | Affected Version | How to fix |
---|---|---|
Windows 10 | =1607 | |
Windows 10 | =1703 | |
Windows 10 | =1709 | |
Windows 10 | =1803 | |
Windows 10 | =1809 | |
Windows 10 | =1903 | |
Microsoft Windows Server 2016 | ||
Microsoft Windows Server 2016 | =1803 | |
Microsoft Windows Server 2016 | =1903 | |
Microsoft Windows Server 2019 | ||
Microsoft Windows Operating System | ||
Microsoft Windows 10 | ||
Microsoft Windows 10 | ||
Microsoft Windows 10 | ||
Microsoft Windows 10 | ||
Microsoft Windows 10 | ||
Microsoft Windows 10 | ||
Microsoft Windows 10 | ||
Microsoft Windows 10 | ||
Microsoft Windows 10 | ||
Microsoft Windows 10 | ||
Microsoft Windows 10 | ||
Microsoft Windows 10 | ||
Microsoft Windows 10 | ||
Microsoft Windows 10 | ||
Microsoft Windows 10 | ||
Microsoft Windows 10 | ||
Microsoft Windows Server | ||
Microsoft Windows Server | ||
Microsoft Windows Server 1903 | ||
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-1064 has a high severity rating due to its potential for allowing elevation of privilege.
To fix CVE-2019-1064, apply the latest security updates provided by Microsoft for affected Windows versions.
CVE-2019-1064 affects Windows 10 versions 1607, 1703, 1709, 1803, 1809, 1903, as well as Windows Server 2016 and 2019.
CVE-2019-1064 requires local access to the vulnerable system to be exploited, thus it is not classified as remotely exploitable.
CVE-2019-1064 can allow an attacker to elevate their privileges, gaining full control over the system.