Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).

CVE-2019-0959Microsoft Windows 10 Version 1803 vulnerability

8 documents6 sources
Severity
7.0HIGHNVD
EPSS
3.0%
top 13.32%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Timeline
PublishedJun 12
Latest updateMay 1

Description

An elevation of privilege vulnerability exists when the Windows Common Log File System (CLFS) driver improperly handles objects in memory. An attacker who successfully exploited this vulnerability could run processes in an elevated context. To exploit the vulnerability, an attacker would first have to log on to the system, and then run a specially crafted application to take control over the affected system. The security update addresses the vulnerability by correcting how CLFS handles objects i

CVSS vector

CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 1.0 | Impact: 5.9

Patches

🔴Vulnerability Details

3
Project0
The Windows Registry Adventure #7: Attack surface analysis - Project Zero2025-05-01
GHSA
GHSA-fvqq-gr4j-pf2q: An elevation of privilege vulnerability exists when the Windows Common Log File System (CLFS) driver improperly handles objects in memory, aka 'Window2022-05-24
GHSA
GHSA-65jq-gvpm-pj63: An elevation of privilege vulnerability exists when the Windows Common Log File System (CLFS) driver improperly handles objects in memory, aka 'Window2022-05-24

💥Exploits & PoCs

1
Exploit-DB
Microsoft Windows - 'CmpAddRemoveContainerToCLFSLog' Arbitrary File/Directory Creation2019-06-24

📋Vendor Advisories

1
Microsoft
Windows Common Log File System Driver Elevation of Privilege Vulnerability2019-06-11

🕵️Threat Intelligence

2
Trendmicro
December Patch Tuesday: Fixes for components, RDP2019-12-11
Trendmicro
December Patch Tuesday: Fixes for components, RDP2019-12-11
CVE-2019-0959 — Microsoft vulnerability | cvebase