Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).

CVE-2019-0881Insufficiently Protected Credentials in Microsoft Windows

Severity
7.8HIGHNVD
EPSS
4.3%
top 11.14%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Timeline
PublishedMay 16
Latest updateMay 1

Description

An elevation of privilege vulnerability exists when the Windows Kernel improperly handles key enumeration, aka 'Windows Kernel Elevation of Privilege Vulnerability'.

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9

Affected Packages23 packages

CVEListV5microsoft/windows20 versions+19
NVDmicrosoft/windowsr2, 1709, 1803+2

Patches

🔴Vulnerability Details

4
Project0
The Windows Registry Adventure #8: Practical exploitation of hive memory corruption - Project Zero2025-05-01
Project0
The Windows Registry Adventure #7: Attack surface analysis - Project Zero2025-05-01
Project0
The Windows Registry Adventure #5: The regf file format - Project Zero2024-12-01
GHSA
GHSA-chq2-xrc4-6mwv: An elevation of privilege vulnerability exists when the Windows Kernel improperly handles key enumeration, aka 'Windows Kernel Elevation of Privilege2022-05-24

💥Exploits & PoCs

1
Exploit-DB
Microsoft Windows 10 1809 - 'CmKeyBodyRemapToVirtualForEnum' Arbitrary Key Enumeration Privilege Escalation2019-05-23

📋Vendor Advisories

1
Microsoft
Windows Kernel Elevation of Privilege Vulnerability2019-05-14

💬Community

1
Bugzilla
CVE-2019-20807 vim: users can execute arbitrary OS commands via scripting interfaces in the rvim restricted mode2020-06-01
CVE-2019-0881 — Insufficiently Protected Credentials | cvebase