CISA KEV 정보
| 취약점명 | Microsoft Windows AppX Deployment Service (AppXSVC) Privilege Escalation Vulnerability |
|---|---|
| 설명 | A privilege escalation vulnerability exists when Windows AppXSVC improperly handles hard links. An attacker who successfully exploited this vulnerability could run processes in an elevated context. |
| 조치사항 | Apply updates per vendor instructions. |
| 랜섬웨어 캠페인 악용 | Known |
| CWE | CWE-59 |
| 등록일 (KEV) | 2022-03-15 |
| 조치 기한 | 2022-04-05 |
| 추가 참고 | https://nvd.nist.gov/vuln/detail/CVE-2019-1064 |
NVD 상세 정보
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HAV:L/AC:L/Au:N/C:C/I:C/A:C설명: An elevation of privilege vulnerability exists when Windows AppX Deployment Service (AppXSVC) improperly handles hard links. An attacker who successfully exploited this vulnerability could run processes in an elevated context. An attacker could then install programs; view, change or delete data. To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that could exploit the vulnerability and take control of an affected system. The security update addresses the vulnerability by correcting how Windows AppX Deployment Service handles hard links.
CWE: CWE-59 | CWE-59
참조
- https://msrc.microsoft.com/update-guide/vulnerability/CVE-2019-1064 [Patch, Vendor Advisory]
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1064 [Patch, Vendor Advisory]
- https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2019-1064 [US Government Resource]
This product uses the NVD API but is not endorsed or certified by the NVD.