← Back to CVEs
CVE-2019-1069
HIGHCISA KEV7.8
Description
An elevation of privilege vulnerability exists in the way the Task Scheduler Service validates certain file operations. An attacker who successfully exploited the vulnerability could gain elevated privileges on a victim system. To exploit the vulnerability, an attacker would require unprivileged code execution on a victim system. The security update addresses the vulnerability by correctly validating file operations.
CVE Details
CVSS v3.1 Score7.8
SeverityHIGH
CVSS VectorCVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Attack VectorLOCAL
ComplexityLOW
Privileges RequiredLOW
User InteractionNONE
Published6/12/2019
Last Modified10/29/2025
Sourcekev
Honeypot Sightings0
CISA KEV
VendorMicrosoft
ProductTask Scheduler
Vulnerability NameMicrosoft Task Scheduler Privilege Escalation Vulnerability
KEV Date Added2022-03-15
Remediation Due Date2022-04-05
Ransomware UseKnown
Affected Products
microsoft:windows_10_1507microsoft:windows_10_1607microsoft:windows_10_1703microsoft:windows_10_1709microsoft:windows_10_1803microsoft:windows_10_1809microsoft:windows_10_1903microsoft:windows_server_1803microsoft:windows_server_1903microsoft:windows_server_2016microsoft:windows_server_2019
Weaknesses (CWE)
CWE-59CWE-59
References
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2019-1069(secure@microsoft.com)
https://blog.0patch.com/2019/06/another-task-scheduler-0day-another.html(af854a3a-2127-422b-91ae-364da2661108)
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1069(af854a3a-2127-422b-91ae-364da2661108)
https://www.kb.cert.org/vuls/id/119704(af854a3a-2127-422b-91ae-364da2661108)
https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2019-1069(134c704f-9b21-4f2e-91b3-4a467353bcc0)
IOC Correlations
No correlations recorded
This product uses data from the NVD API but is not endorsed or certified by the NVD.