An elevation of privilege vulnerability exists when the Windows Universal Plug and Play (UPnP) service improperly allows COM object creation, aka 'Windows UPnP Service Elevation of Privilege Vulnerability'.
References
Link | Resource |
---|---|
http://packetstormsecurity.com/files/155723/Microsoft-UPnP-Local-Privilege-Elevation.html | Third Party Advisory VDB Entry |
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1405 | Patch Vendor Advisory |
http://packetstormsecurity.com/files/155723/Microsoft-UPnP-Local-Privilege-Elevation.html | Third Party Advisory VDB Entry |
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1405 | Patch Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
04 Apr 2025, 19:30
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:o:microsoft:windows_server_2016:1903:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_server_2016:1803:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:* |
cpe:2.3:o:microsoft:windows_10_1709:-:*:*:*:*:*:x64:* cpe:2.3:o:microsoft:windows_10_1903:-:*:*:*:*:*:arm64:* cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:x86:* cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:x64:* cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:x64:* cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:x64:* cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:x64:* cpe:2.3:o:microsoft:windows_10_1803:-:*:*:*:*:*:x86:* cpe:2.3:o:microsoft:windows_10_1709:-:*:*:*:*:*:arm64:* cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:x86:* cpe:2.3:o:microsoft:windows_server_1803:-:*:*:*:*:*:x64:* cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:x86:* cpe:2.3:o:microsoft:windows_server_1903:-:*:*:*:*:*:x64:* cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:x86:* cpe:2.3:o:microsoft:windows_10_1803:-:*:*:*:*:*:arm64:* cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:arm64:* cpe:2.3:o:microsoft:windows_10_1903:-:*:*:*:*:*:x64:* cpe:2.3:o:microsoft:windows_10_1709:-:*:*:*:*:*:x86:* cpe:2.3:o:microsoft:windows_10_1803:-:*:*:*:*:*:x64:* cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:x86:* cpe:2.3:o:microsoft:windows_10_1903:-:*:*:*:*:*:x86:* |
First Time |
Microsoft windows 10 1809
Microsoft windows 10 1507 Microsoft windows 10 1709 Microsoft windows 10 1803 Microsoft windows 10 1607 Microsoft windows Server 1903 Microsoft windows 10 1903 Microsoft windows Server 1803 |
07 Feb 2025, 16:15
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-269 |
Information
Published : 2019-11-12 19:15
Updated : 2025-04-04 19:30
NVD link : CVE-2019-1405
Mitre link : CVE-2019-1405
CVE.ORG link : CVE-2019-1405
JSON object : View
Products Affected
microsoft
- windows_server_1903
- windows_server_2019
- windows_server_2016
- windows_10_1903
- windows_server_2008
- windows_server_2012
- windows_10_1809
- windows_10_1709
- windows_rt_8.1
- windows_8.1
- windows_server_1803
- windows_10_1803
- windows_7
- windows_10_1607
- windows_10_1507
CWE