⚠ Actively exploited in ransomware campaigns
This vulnerability is on the CISA Known Exploited Vulnerabilities list and has been used in known ransomware attacks. CISA required action: Apply updates per vendor instructions.. Due date: 2022-04-05.

CVE-2019-1064Link Following in Microsoft Windows 10 Version 1607

CWE-59Link Following8 documents8 sources
Severity
7.8HIGHNVD
EPSS
12.2%
top 6.13%
CISA KEV
KEVRansomware
Added 2022-03-15
Due 2022-04-05
Exploit
Exploited in wild
Active exploitation observed
Timeline
PublishedJun 12
KEV addedMar 15
KEV dueApr 5
Latest updateMay 24
CISA Required Action: Apply updates per vendor instructions.

Description

An elevation of privilege vulnerability exists when Windows AppX Deployment Service (AppXSVC) improperly handles hard links. An attacker who successfully exploited this vulnerability could run processes in an elevated context. An attacker could then install programs; view, change or delete data. To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that could exploit the vulnerability and take control of an

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9

Affected Packages11 packages

CVEListV5microsoft/windows_server_201610.0.14393.0publication

Patches

🔴Vulnerability Details

3
GHSA
GHSA-7q5j-w2g3-7f8v: An elevation of privilege vulnerability exists when Windows AppX Deployment Service (AppXSVC) improperly handles hard links, aka 'Windows Elevation of2022-05-24
CVEList
Windows Elevation of Privilege Vulnerability2019-06-12
VulnCheck
Microsoft Windows AppX Deployment Service (AppXSVC) Privilege Escalation Vulnerability2019

🔍Detection Rules

1
YARA
HKTL_NET_GUID_CVE_2019_1064

📋Vendor Advisories

2
CISA
Microsoft Windows AppX Deployment Service (AppXSVC) Privilege Escalation Vulnerability2022-03-15
Microsoft
Windows Elevation of Privilege Vulnerability2019-06-11
CVE-2019-1064 — Link Following in Microsoft | cvebase