CVE-2019-1169
4 documents4 sources
Severity
7.8HIGH
EPSS
1.5%
top 19.02%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedAug 14
Latest updateMay 24
Description
An elevation of privilege vulnerability exists in Windows when the Windows kernel-mode driver fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.
To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application th…
CVSS vector
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9
Affected Packages8 packages
▶CVEListV5microsoft/windows_server_2008_service_pack_2_(server_core_installation)6.0.0 — publication
▶CVEListV5microsoft/windows_server_2008_r2_service_pack_1_(server_core_installation)6.0.0 — publication