An elevation of privilege vulnerability exists when Windows AppX Deployment Service (AppXSVC) improperly handles hard links. An attacker who successfully exploited this vulnerability could run processes in an elevated context. An attacker could then install programs; view, change or delete data.
To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that could exploit the vulnerability and take control of an affected system.
The security update addresses the vulnerability by correcting how Windows AppX Deployment Service handles hard links.
References
| Link | Resource |
|---|---|
| https://msrc.microsoft.com/update-guide/vulnerability/CVE-2019-1064 | Patch Vendor Advisory |
| https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1064 | Patch Vendor Advisory |
| https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2019-1064 | US Government Resource |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2019-06-12 14:29
Updated : 2025-10-29 14:39
NVD link : CVE-2019-1064
Mitre link : CVE-2019-1064
CVE.ORG link : CVE-2019-1064
JSON object : View
Products Affected
microsoft
- windows_server_2019
- windows_10_1709
- windows_10_1903
- windows_10_1803
- windows_server_1709
- windows_10_1703
- windows_10_1607
- windows_server_2016
- windows_10_1809
- windows_server_1903
- windows_server_1803
CWE
CWE-59
Improper Link Resolution Before File Access ('Link Following')
