CVE-2024-49039
Windows Task Scheduler Elevation of Privilege Vulnerability
Basic Information
- CVE State
- PUBLISHED
- Reserved Date
- October 11, 2024
- Published Date
- November 12, 2024
- Last Updated
- January 30, 2025
- Vendor
- Microsoft
- Product
- Windows Server 2025, Windows Server 2025 (Server Core installation), Windows 10 Version 1809, Windows Server 2019, Windows Server 2019 (Server Core installation), Windows Server 2022, Windows 10 Version 21H2, Windows 11 version 22H2, Windows 10 Version 22H2, Windows 11 version 22H3, Windows 11 Version 23H2, Windows Server 2022, 23H2 Edition (Server Core installation), Windows 11 Version 24H2, Windows 10 Version 1507, Windows 10 Version 1607, Windows Server 2016, Windows Server 2016 (Server Core installation)
- Description
- Windows Task Scheduler Elevation of Privilege Vulnerability
CVSS Scores
CVSS v3.1
8.8 - HIGH
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:F/RL:O/RC:C
SSVC Information
- Exploitation
- active
- Technical Impact
- total
Known Exploited Vulnerability Information
Source | Added Date |
---|---|
CISA | 2024-11-12 00:00:00 UTC |
Potential Proof of Concepts
Warning: These PoCs have not been tested and could contain malware. Use at your own risk.
Alexandr-bit253/CVE-2024-49039
Type: github • Created: 2024-12-16 13:25:56 UTC • Stars: 3
je5442804/WPTaskScheduler_CVE-2024-49039
Type: github • Created: 2024-11-19 08:57:18 UTC • Stars: 119
WPTaskScheduler RPC Persistence & CVE-2024-49039 via Task Scheduler