Skip to main content

Microsoft Windows Task Scheduler Vulnerability

Last Update Date: 28 Jan 2011 Release Date: 15 Dec 2010 5617 Views

RISK: Medium Risk

An elevation of privilege vulnerability exists in the way that the Windows Task Scheduler improperly validates whether scheduled tasks run within the intended security context. An attacker who successfully exploited this vulnerability could run arbitrary code in the security context of the local system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.