Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2019-1044

Опубликовано: 12 июн. 2019
Источник: nvd
CVSS3: 7.8
CVSS3: 5.3
CVSS2: 7.2
EPSS Низкий

Описание

A security feature bypass vulnerability exists when Windows Secure Kernel Mode fails to properly handle objects in memory. To exploit the vulnerability, a locally-authenticated attacker could attempt to run a specially crafted application on a targeted system. An attacker who successfully exploited the vulnerability could violate virtual trust levels (VTL). The update addresses the vulnerability by correcting how Windows Secure Kernel Mode handles objects in memory to properly enforce VTLs.

Уязвимые конфигурации

Конфигурация 1

Одно из

cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*

EPSS

Процентиль: 51%
0.00277
Низкий

7.8 High

CVSS3

5.3 Medium

CVSS3

7.2 High

CVSS2

Дефекты

NVD-CWE-noinfo

Связанные уязвимости

CVSS3: 5.3
msrc
около 6 лет назад

Windows Secure Kernel Mode Security Feature Bypass Vulnerability

CVSS3: 7.8
github
около 3 лет назад

A security feature bypass vulnerability exists when Windows Secure Kernel Mode fails to properly handle objects in memory.To exploit the vulnerability, a locally-authenticated attacker could attempt to run a specially crafted application on a targeted system, aka 'Windows Secure Kernel Mode Security Feature Bypass Vulnerability'.

CVSS3: 7.8
fstec
около 6 лет назад

Уязвимость механизма Windows Secure Kernel Mode операционных систем Windows, позволяющая нарушителю вызвать некорректое применение виртуальных уровней доверия

EPSS

Процентиль: 51%
0.00277
Низкий

7.8 High

CVSS3

5.3 Medium

CVSS3

7.2 High

CVSS2

Дефекты

NVD-CWE-noinfo