First published: Wed Sep 11 2019(Updated: )
An elevation of privilege vulnerability exists when Windows improperly handles calls to Advanced Local Procedure Call (ALPC).An attacker who successfully exploited this vulnerability could run arbitrary code in the security context of the local system, aka 'Windows ALPC Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2019-1272.
Credit: secure@microsoft.com
Affected Software | Affected Version | How to fix |
---|---|---|
Microsoft Windows 10 | ||
Microsoft Windows 10 | =1607 | |
Microsoft Windows 10 | =1703 | |
Microsoft Windows 10 | =1709 | |
Microsoft Windows 10 | =1803 | |
Microsoft Windows 10 | =1809 | |
Microsoft Windows 10 | =1903 | |
Microsoft Windows 8.1 | ||
Microsoft Windows RT | ||
Microsoft Windows Server 2012 x64 | =r2 | |
Microsoft Windows Server 2016 | ||
Microsoft Windows Server 2016 | =1803 | |
Microsoft Windows Server 2016 | =1903 | |
Microsoft Windows Server 2019 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-1269 is rated as important by Microsoft due to its potential for elevation of privilege.
To fix CVE-2019-1269, apply the latest security update released by Microsoft for the affected versions of Windows.
CVE-2019-1269 affects multiple versions of Windows, including Windows 10, Windows 8.1, and Windows Server 2016.
CVE-2019-1269 is an elevation of privilege vulnerability associated with improper handling of ALPC calls in Windows.
CVE-2019-1269 requires local access for exploitation, making it less likely to be exploited remotely.