Show vulnerabilities with patch / with exploit

Deletion of arbitrary files in Microsoft Defender

Published: 2019-08-14
Severity Low
Patch available YES
Number of vulnerabilities 1
CVE ID CVE-2019-1161
Exploitation vector Local
Public exploit N/A
Vulnerable software
Microsoft Forefront Endpoint Protection
Server applications / DLP, anti-spam, sniffers

Microsoft Security Essentials
Client/Desktop applications / Antivirus software/Personal firewalls

Windows Defender
Client/Desktop applications / Antivirus software/Personal firewalls

Vendor Microsoft

Security Advisory

This security advisory describes one low risk vulnerability.

1) Permissions, Privileges, and Access Controls

Severity: Low

CVSSv3: 3.3 [CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L/E:U/RL:O/RC:C]

CVE-ID: CVE-2019-1161

CWE-ID: CWE-264 - Permissions, Privileges, and Access Controls

Exploit availability: No


The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists in the MpSigStub.exe for Defender that allows arbitrary file deletion. A local user can run a specially crafted command and delete protected files on the system.


Install update from vendor's website.

Vulnerable software versions

Microsoft Forefront Endpoint Protection: 2010

Microsoft Security Essentials: -

Windows Defender: for Windows 8.1, for Windows 10, Windows 10 1511, Windows 10 1607, Windows Server 2016, Windows 10 1703, for Windows RT 8.1, on Windows 7 for 32-bit Systems Service Pack 1, on Windows Server 2008, on Windows Server 2012

CPE External links

Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.