CVE-2019-1064

HIGH KEV RANSOMWARE

Microsoft Windows 10 1607 - Symlink Following

Title source: rule

Description

An elevation of privilege vulnerability exists when Windows AppX Deployment Service (AppXSVC) improperly handles hard links. An attacker who successfully exploited this vulnerability could run processes in an elevated context. An attacker could then install programs; view, change or delete data. To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that could exploit the vulnerability and take control of an affected system. The security update addresses the vulnerability by correcting how Windows AppX Deployment Service handles hard links.

Exploits (4)

nomisec WORKING POC 26 stars
by RythmStick · local
https://github.com/RythmStick/CVE-2019-1064
nomisec WORKING POC 11 stars
by 0x00-0x00 · local
https://github.com/0x00-0x00/CVE-2019-1064
nomisec SUSPICIOUS 1 stars
by attackgithub · poc
https://github.com/attackgithub/CVE-2019-1064
patchapalooza WORKING POC
by gavz · client-side
https://gitlab.com/gavz/CVE-2019-1064

Scores

CVSS v3 7.8
EPSS 0.1222
EPSS Percentile 93.9%
Attack Vector LOCAL
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Details

CISA KEV 2022-03-15
VulnCheck KEV 2022-03-15
InTheWild.io 2022-03-15
ENISA EUVD EUVD-2019-9646
Ransomware Use Confirmed
CWE
CWE-59
Status published
Products (11)
microsoft/windows_10_1607 (2 CPE variants)
microsoft/windows_10_1703 (2 CPE variants)
microsoft/windows_10_1709 (3 CPE variants)
microsoft/windows_10_1803 (3 CPE variants)
microsoft/windows_10_1809 (3 CPE variants)
microsoft/windows_10_1903 (3 CPE variants)
microsoft/windows_server_1709
microsoft/windows_server_1803
microsoft/windows_server_1903
microsoft/windows_server_2016
... and 1 more
Published Jun 12, 2019
KEV Added Mar 15, 2022
Tracked Since Feb 18, 2026