CVE-2019-1483Link Following in Microsoft Windows

CWE-59Link Following9 documents5 sources
Severity
7.8HIGHNVD
EPSS
0.7%
top 27.47%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedDec 10
Latest updateMay 24

Description

An elevation of privilege vulnerability exists when the Windows AppX Deployment Server improperly handles junctions.To exploit this vulnerability, an attacker would first have to gain execution on the victim system, aka 'Windows Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2019-1476.

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9

Affected Packages10 packages

Patches

🔴Vulnerability Details

4
GHSA
GHSA-p63v-jvxj-6r27: An elevation of privilege vulnerability exists when the Windows AppX Deployment Server improperly handles junctions2022-05-24
GHSA
GHSA-326j-x45p-9g82: An elevation of privilege vulnerability exists when Windows AppX Deployment Service (AppXSVC) improperly handles hard links, aka 'Windows Elevation of2022-05-24
CVEList
CVE-2019-1476: An elevation of privilege vulnerability exists when Windows AppX Deployment Service (AppXSVC) improperly handles hard links, aka 'Windows Elevation of2019-12-10
CVEList
CVE-2019-1483: An elevation of privilege vulnerability exists when the Windows AppX Deployment Server improperly handles junctions2019-12-10

📋Vendor Advisories

1
Microsoft
Windows Elevation of Privilege Vulnerability2019-12-10

🕵️Threat Intelligence

2
Talos
Microsoft Patch Tuesday — Dec. 2019: Vulnerability disclosures and Snort coverage2019-12-10
Talos
Microsoft Patch Tuesday — Dec. 2019: Vulnerability disclosures and Snort coverage2019-12-10
CVE-2019-1483 — Link Following in Microsoft Windows | cvebase