Lucene search

K
cve[email protected]CVE-2019-0960
HistoryJun 12, 2019 - 2:29 p.m.

CVE-2019-0960

2019-06-1214:29:01
web.nvd.nist.gov
55
cve-2019-0960
windows
win32k
elevation of privilege
vulnerability

7.2 High

CVSS2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

7.5 High

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

9.5%

An elevation of privilege vulnerability exists in Windows when the Win32k component fails to properly handle objects in memory, aka ‘Win32k Elevation of Privilege Vulnerability’. This CVE ID is unique from CVE-2019-1014, CVE-2019-1017.

Affected configurations

Vulners
NVD
Node
microsoftwindows
OR
microsoftwindows
OR
microsoftwindows_server
OR
microsoftwindows_server
OR
microsoftwindows_server
OR
microsoftwindows_server
OR
microsoftwindows_server
OR
microsoftwindows_server
OR
microsoftwindows_server
OR
microsoftwindows_server
VendorProductVersionCPE
microsoftwindows*cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*
microsoftwindows*cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*
microsoftwindows_server*cpe:2.3:o:microsoft:windows_server:*:*:*:*:*:*:*:*
microsoftwindows_server*cpe:2.3:o:microsoft:windows_server:*:*:*:*:*:*:*:*
microsoftwindows_server*cpe:2.3:o:microsoft:windows_server:*:*:*:*:*:*:*:*
microsoftwindows_server*cpe:2.3:o:microsoft:windows_server:*:*:*:*:*:*:*:*
microsoftwindows_server*cpe:2.3:o:microsoft:windows_server:*:*:*:*:*:*:*:*
microsoftwindows_server*cpe:2.3:o:microsoft:windows_server:*:*:*:*:*:*:*:*
microsoftwindows_server*cpe:2.3:o:microsoft:windows_server:*:*:*:*:*:*:*:*
microsoftwindows_server*cpe:2.3:o:microsoft:windows_server:*:*:*:*:*:*:*:*

CNA Affected

[
  {
    "product": "Windows",
    "vendor": "Microsoft",
    "versions": [
      {
        "status": "affected",
        "version": "7 for 32-bit Systems Service Pack 1"
      },
      {
        "status": "affected",
        "version": "7 for x64-based Systems Service Pack 1"
      }
    ]
  },
  {
    "product": "Windows Server",
    "vendor": "Microsoft",
    "versions": [
      {
        "status": "affected",
        "version": "2008 R2 for x64-based Systems Service Pack 1 (Core installation)"
      },
      {
        "status": "affected",
        "version": "2008 R2 for Itanium-Based Systems Service Pack 1"
      },
      {
        "status": "affected",
        "version": "2008 R2 for x64-based Systems Service Pack 1"
      },
      {
        "status": "affected",
        "version": "2008 for 32-bit Systems Service Pack 2 (Core installation)"
      },
      {
        "status": "affected",
        "version": "2008 for Itanium-Based Systems Service Pack 2"
      },
      {
        "status": "affected",
        "version": "2008 for 32-bit Systems Service Pack 2"
      },
      {
        "status": "affected",
        "version": "2008 for x64-based Systems Service Pack 2"
      },
      {
        "status": "affected",
        "version": "2008 for x64-based Systems Service Pack 2 (Core installation)"
      }
    ]
  }
]

7.2 High

CVSS2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

7.5 High

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

9.5%