Privilege escalation in Microsoft Windows RPCSS

Published: 2019-07-10 15:00:11 | Updated: 2019-07-10
Severity Low
Patch available YES
Number of vulnerabilities 1
CVE ID CVE-2019-1089
CVSSv3 6.8 [CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]
CWE ID CWE-20
Exploitation vector Local
Public exploit N/A
Vulnerable software Windows
Windows Server
Vulnerable software versions Windows 8.1
Windows 7
Windows 10

Show more

Windows Server 2012
Windows Server 2012 R2
Windows Server 2008

Show more

Vendor URL Microsoft

Security Advisory

1) Input validation error

Description

The vulnerability allows a local user to elevate privileges on the system.

The vulnerability exists due to insufficient validation of user-supplied input when the RPC service Activation Kernel improperly handles an RPC request in rpcss.dll. A local user can create a specially crafted application, run it on the affected system and execute arbitrary code with elevated privileges.


Remediation

Install update from vendor's website.

External links

https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1089

Back to List