Permissions, Privileges, and Access Controls in Windows and Windows Server - CVE-2019-1321

 

Permissions, Privileges, and Access Controls in Windows and Windows Server - CVE-2019-1321

Published: October 9, 2019


Vulnerability identifier: #VU21669
CSH Severity: Low
CVSS v4.0: CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:L/VA:L/SC:N/SI:N/SA:N/E:U/U:Clear
CVE-ID: CVE-2019-1321
CWE-ID: CWE-264
Exploitation vector: Local access
Exploit availability: No public exploit available
Vendor: Microsoft
Affected software:
Windows
Windows Server

Detailed vulnerability description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to the way Windows CloudStore handles file Discretionary Access Control List (DACL). A local user can create a malicious application, launch it on the system, overwrite a targeted file leading to an elevated status and take control of an affected system.

To exploit this vulnerability, an attacker would first have to log on to the system.


How to mitigate CVE-2019-1321

Install update from vendor's website.

Sources