Microsoft Monthly Security Update (Jun 2019)
RISK: High Risk
TYPE: Operating Systems - Windows OS
[Updated on 2024-09-19]
Updated Risk Level, Description, Source and Related Links.
CVE-2019-1069 vulnerability is exploited in the wild. An elevation of privilege vulnerability exists in the way the Task Scheduler Service validates certain file operations. An attacker who successfully exploited the vulnerability could gain elevated privileges on a victim system. Hence, the risk level is rated from Medium Risk to High Risk.
Microsoft has released monthly security update for their products:
Vulnerable Product | Severity | Impacts | Notes | Details (including CVE) |
Browser | Moderately Critical | Security Restriction Bypass Remote Code Execution Information Disclosure | ||
Developer Tools | Moderately Critical | Remote Code Execution Spoofing Information Disclosure | ||
Microsoft Office | Moderately Critical | Denial of Service Spoofing Remote Code Execution | ||
Windows | High Risk | Security Restriction Bypass Data Manipulation Elevation of Privilege Information Disclosure Remote Code Execution Denial of Service | CVE-2019-1069 is exploited in the wild. An elevation of privilege vulnerability exists in the way the Task Scheduler Service validates certain file operations. An attacker who successfully exploited the vulnerability could gain elevated privileges on a victim system. |
Number of 'Extremely Critical' product(s): 0
Number of 'Highly Critical' product(s): 1
Number of 'Moderately Critical' product(s): 3
Evaluation of overall 'Criticality Level': Highly Critical
Impact
- Denial of Service
- Remote Code Execution
- Elevation of Privilege
- Security Restriction Bypass
- Information Disclosure
- Spoofing
System / Technologies affected
- Windows
- Browser
- Developer Tools
- Microsoft Office
Solutions
Before installation of the software, please visit the software manufacturer web-site for more details.
- The vendor has issued security updates for the products. Please refer to 'Details' column in the above table for details of individual product update or run software update.
Vulnerability Identifier
Source
Related Link
Related Tags
Share with