CVE-2019-1186

5 documents5 sources
Severity
7.0HIGH
EPSS
0.2%
top 54.35%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedAug 14
Latest updateMay 24

Description

An elevation of privilege vulnerability exists in the way that the wcmsvc.dll handles objects in memory. An attacker who successfully exploited the vulnerability could execute code with elevated permissions. To exploit the vulnerability, a locally authenticated attacker could run a specially crafted application. The security update addresses the vulnerability by ensuring the wcmsvc.dll properly handles objects in memory.

CVSS vector

CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 1.0 | Impact: 5.9

Affected Packages16 packages

CVEListV5microsoft/windows_server_201610.0.0publication
CVEListV5microsoft/windows_server_201910.0.0publication
CVEListV5microsoft/windows_10_version_150710.0.0publication
CVEListV5microsoft/windows_10_version_160710.0.0publication
CVEListV5microsoft/windows_10_version_170310.0.0publication

Patches

🔴Vulnerability Details

2
GHSA
GHSA-hxfv-8253-2p76: An elevation of privilege vulnerability exists in the way that the wcmsvc2022-05-24
CVEList
Windows Elevation of Privilege Vulnerability2019-08-14

📋Vendor Advisories

1
Microsoft
Windows Elevation of Privilege Vulnerability2019-08-13

💬Community

1
Bugzilla
CVE-2019-1002162 atomic-reactor: Information exposure on push fail logged exceptions2019-03-29
CVE-2019-1186 (HIGH CVSS 7) | An elevation of privilege vulnerabi | cvebase.io