Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).

CVE-2019-1089Microsoft Windows 10 vulnerability

5 documents5 sources
Severity
7.8HIGHNVD
EPSS
2.0%
top 16.35%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Timeline
PublishedJul 15
Latest updateMay 24

Description

An elevation of privilege vulnerability exists in rpcss.dll when the RPC service Activation Kernel improperly handles an RPC request. To exploit this vulnerability, a low level authenticated attacker could run a specially crafted application. The security update addresses this vulnerability by correcting how rpcss.dll handles these requests., aka 'Windows RPCSS Elevation of Privilege Vulnerability'.

CVSS vector

CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9

Affected Packages3 packages

NVDmicrosoft/windowsr2, 1803, 1903+2
NVDmicrosoft/windows_106 versions+5
CVEListV5microsoft/multipleMultiple

Patches

🔴Vulnerability Details

2
GHSA
GHSA-vvxh-m5f8-9r2g: An elevation of privilege vulnerability exists in rpcss2022-05-24
CVEList
CVE-2019-1089: An elevation of privilege vulnerability exists in rpcss2019-07-15

💥Exploits & PoCs

1
Exploit-DB
Microsoft Windows 10 1903/1809 - RPCSS Activation Kernel Security Callback Privilege Escalation2019-07-18

📋Vendor Advisories

1
Microsoft
Windows RPCSS Elevation of Privilege Vulnerability2019-07-09
CVE-2019-1089 — Microsoft Windows 10 vulnerability | cvebase