CVE-2019-1253

An elevation of privilege vulnerability exists when the Windows AppX Deployment Server improperly handles junctions.To exploit this vulnerability,...

Basic Information

CVE State
PUBLISHED
Reserved Date
November 26, 2018
Published Date
September 11, 2019
Last Updated
February 07, 2025
Vendor
Microsoft
Product
Windows, Windows Server, Windows 10 Version 1903 for 32-bit Systems, Windows 10 Version 1903 for x64-based Systems, Windows 10 Version 1903 for ARM64-based Systems, Windows Server, version 1903 (Server Core installation)
Description
An elevation of privilege vulnerability exists when the Windows AppX Deployment Server improperly handles junctions.To exploit this vulnerability, an attacker would first have to gain execution on the victim system, aka 'Windows Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2019-1215, CVE-2019-1278, CVE-2019-1303.
Tags
windows cisa malware ransomware microsoft

CVSS Scores

CVSS v3.1

7.8 - HIGH

Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

CVSS v2.0

7.2

Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C

SSVC Information

Exploitation
active
Technical Impact
total

Exploit Status

Exploited in the Wild
Yes (2022-03-15 00:00:00 UTC) Source
Proof of Concept Available
Yes (added 2019-09-11 09:59:22 UTC) Source
Used in Malware
Yes (added 2022-03-15 00:00:00 UTC) Source

Known Exploited Vulnerability Information

Source Added Date
CISA 2022-03-15 00:00:00 UTC

Potential Proof of Concepts

Warning: These PoCs have not been tested and could contain malware. Use at your own risk.

sgabe/CVE-2019-1253

Type: github • Created: 2019-09-11 23:28:59 UTC • Stars: 20

AppXSvc Arbitrary File Security Descriptor Overwrite EoP

padovah4ck/CVE-2019-1253

Type: github • Created: 2019-09-11 20:40:15 UTC • Stars: 156

Poc for CVE-2019-1253

likekabin/CVE-2019-1253

Type: github • Created: 2019-09-11 09:59:22 UTC • Stars: 0

rogue-kdc/CVE-2019-1253

Type: github • Created: 2019-04-10 09:44:38 UTC • Stars: 50

Timeline

  • CVE ID Reserved

  • Proof of Concept Exploit Available

  • CVE Published to Public

  • Exploit Used in Malware

  • Added to KEVIntel