CISA KEV 정보
| 취약점명 | Microsoft Task Scheduler Privilege Escalation Vulnerability |
|---|---|
| 설명 | A privilege escalation vulnerability exists in the way the Task Scheduler Service validates certain file operations. |
| 조치사항 | Apply updates per vendor instructions. |
| 랜섬웨어 캠페인 악용 | Known |
| CWE | CWE-59 |
| 등록일 (KEV) | 2022-03-15 |
| 조치 기한 | 2022-04-05 |
| 추가 참고 | https://nvd.nist.gov/vuln/detail/CVE-2019-1069 |
NVD 상세 정보
CVSS v3.1: 7.8 HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HCVSS v2.0: 7.2
AV:L/AC:L/Au:N/C:C/I:C/A:C설명: An elevation of privilege vulnerability exists in the way the Task Scheduler Service validates certain file operations. An attacker who successfully exploited the vulnerability could gain elevated privileges on a victim system. To exploit the vulnerability, an attacker would require unprivileged code execution on a victim system. The security update addresses the vulnerability by correctly validating file operations.
CWE: CWE-59 | CWE-59
참조
- https://msrc.microsoft.com/update-guide/vulnerability/CVE-2019-1069 [Patch, Vendor Advisory]
- https://blog.0patch.com/2019/06/another-task-scheduler-0day-another.html [Exploit, Third Party Advisory]
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1069 [Patch, Vendor Advisory]
- https://www.kb.cert.org/vuls/id/119704 [Third Party Advisory, US Government Resource]
- https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2019-1069 [US Government Resource]
This product uses the NVD API but is not endorsed or certified by the NVD.