Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).
CVE-2019-1476 — Link Following in Microsoft Windows
Severity
7.8HIGHNVD
EPSS
35.6%
top 2.92%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Affected products
Timeline
PublishedDec 10
Latest updateMay 24
Description
An elevation of privilege vulnerability exists when Windows AppX Deployment Service (AppXSVC) improperly handles hard links, aka 'Windows Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2019-1483.
CVSS vector
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9
Affected Packages10 packages
Patches
🔴Vulnerability Details
4GHSA▶
GHSA-p63v-jvxj-6r27: An elevation of privilege vulnerability exists when the Windows AppX Deployment Server improperly handles junctions↗2022-05-24
GHSA▶
GHSA-326j-x45p-9g82: An elevation of privilege vulnerability exists when Windows AppX Deployment Service (AppXSVC) improperly handles hard links, aka 'Windows Elevation of↗2022-05-24
CVEList▶
CVE-2019-1476: An elevation of privilege vulnerability exists when Windows AppX Deployment Service (AppXSVC) improperly handles hard links, aka 'Windows Elevation of↗2019-12-10
CVEList▶
CVE-2019-1483: An elevation of privilege vulnerability exists when the Windows AppX Deployment Server improperly handles junctions↗2019-12-10