An elevation of privilege vulnerability exists when the Windows AppX Deployment Extensions improperly performs privilege management, resulting in access to system files.To exploit this vulnerability, an authenticated attacker would need to run a specially crafted application to elevate privileges.The security update addresses the vulnerability by correcting how AppX Deployment Extensions manages privileges., aka 'Windows AppX Deployment Extensions Elevation of Privilege Vulnerability'.
References
Link | Resource |
---|---|
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1385 | Patch Vendor Advisory |
https://www.zerodayinitiative.com/advisories/ZDI-19-979/ | Third Party Advisory |
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1385 | Patch Vendor Advisory |
https://www.zerodayinitiative.com/advisories/ZDI-19-979/ | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
08 Apr 2025, 15:43
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_server_2016:1803:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_server_2016:1903:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:* |
cpe:2.3:o:microsoft:windows_10_1803:-:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_10_1903:-:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_10_1709:-:*:*:*:*:*:*:* |
First Time |
Microsoft windows 10 1809
Microsoft windows 10 1803 Microsoft windows 10 1709 Microsoft windows 10 1903 |
Information
Published : 2019-11-12 19:15
Updated : 2025-04-08 15:43
NVD link : CVE-2019-1385
Mitre link : CVE-2019-1385
CVE.ORG link : CVE-2019-1385
JSON object : View
Products Affected
microsoft
- windows_10_1903
- windows_10_1809
- windows_10_1709
- windows_server_2016
- windows_10_1803
- windows_server_2019
CWE
CWE-59
Improper Link Resolution Before File Access ('Link Following')