Privilege escalation in AppX Deployment Service in Microsoft Windows

Published: 2019-07-10 09:25:49 | Updated: 2019-07-10
Severity Low
Patch available YES
Number of vulnerabilities 2
CVE ID CVE-2019-1129
CVE-2019-1130
CVSSv3 7.9 [CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:P/RL:O/RC:C]
7.7 [CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]
CWE ID CWE-264
Exploitation vector Local
Public exploit Public exploit code for vulnerability #1 is available.
Vulnerable software Windows
Windows Server
Vulnerable software versions Windows 10 1703
Windows 10 1709
Windows 10 1803

Show more

Windows Server 2019
Windows Server 1803
Windows Server 1903

Show more

Vendor URL Microsoft

Security Advisory

1) Permissions, Privileges, and Access Controls

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to the way Windows AppX Deployment Service (AppXSVC) handles hard links. A local user can create a hard link to a critical file on the system and gain full control over that file.

Successful exploitation of the vulnerability may allow an attacker to gain elevated privileges.

Remediation

Install update from vendor's website.

External links

https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1129

2) Permissions, Privileges, and Access Controls

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to the way Windows AppX Deployment Service (AppXSVC) handles hard links. A local user can create a hard link to a critical file on the system and gain full control over that file.

Successful exploitation of the vulnerability may allow an attacker to gain elevated privileges.

Remediation

Install update from vendor's website.

External links

https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1130

Back to List