An elevation of privilege vulnerability exists when Windows AppX Deployment Service (AppXSVC) improperly handles hard links. An attacker who successfully exploited this vulnerability could run processes in an elevated context. An attacker could then install programs; view, change or delete data. To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that could exploit the vulnerability and take control of an affected system. The security update addresses the vulnerability by correcting how Windows AppX Deployment Service handles hard links.
History

Tue, 20 May 2025 18:00:00 +0000

Type Values Removed Values Added
Description An elevation of privilege vulnerability exists when Windows AppX Deployment Service (AppXSVC) improperly handles hard links, aka 'Windows Elevation of Privilege Vulnerability'. An elevation of privilege vulnerability exists when Windows AppX Deployment Service (AppXSVC) improperly handles hard links. An attacker who successfully exploited this vulnerability could run processes in an elevated context. An attacker could then install programs; view, change or delete data. To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that could exploit the vulnerability and take control of an affected system. The security update addresses the vulnerability by correcting how Windows AppX Deployment Service handles hard links.
Title Windows Elevation of Privilege Vulnerability
References
Metrics cvssV3_1

{'score': 7.8, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}

cvssV3_1

{'score': 7.8, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C'}


Thu, 03 Apr 2025 21:30:00 +0000

Type Values Removed Values Added
First Time appeared Microsoft windows 10 1607
Microsoft windows 10 1703
Microsoft windows 10 1709
Microsoft windows 10 1803
Microsoft windows 10 1809
Microsoft windows 10 1903
Microsoft windows Server 1709
Microsoft windows Server 1803
Microsoft windows Server 1903
CPEs cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_10:1703:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2016:1803:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2016:1903:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:x64:*
cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:x86:*
cpe:2.3:o:microsoft:windows_10_1703:-:*:*:*:*:*:x64:*
cpe:2.3:o:microsoft:windows_10_1703:-:*:*:*:*:*:x86:*
cpe:2.3:o:microsoft:windows_10_1709:-:*:*:*:*:*:arm64:*
cpe:2.3:o:microsoft:windows_10_1709:-:*:*:*:*:*:x64:*
cpe:2.3:o:microsoft:windows_10_1709:-:*:*:*:*:*:x86:*
cpe:2.3:o:microsoft:windows_10_1803:-:*:*:*:*:*:arm64:*
cpe:2.3:o:microsoft:windows_10_1803:-:*:*:*:*:*:x64:*
cpe:2.3:o:microsoft:windows_10_1803:-:*:*:*:*:*:x86:*
cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:arm64:*
cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:x64:*
cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:x86:*
cpe:2.3:o:microsoft:windows_10_1903:-:*:*:*:*:*:arm64:*
cpe:2.3:o:microsoft:windows_10_1903:-:*:*:*:*:*:x64:*
cpe:2.3:o:microsoft:windows_10_1903:-:*:*:*:*:*:x86:*
cpe:2.3:o:microsoft:windows_server_1709:-:*:*:*:*:*:x64:*
cpe:2.3:o:microsoft:windows_server_1803:-:*:*:*:*:*:x64:*
cpe:2.3:o:microsoft:windows_server_1903:-:*:*:*:*:*:x64:*
Vendors & Products Microsoft windows 10
Microsoft windows 10 1607
Microsoft windows 10 1703
Microsoft windows 10 1709
Microsoft windows 10 1803
Microsoft windows 10 1809
Microsoft windows 10 1903
Microsoft windows Server 1709
Microsoft windows Server 1803
Microsoft windows Server 1903
Metrics cvssV3_0

{'score': 7.8, 'vector': 'CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}


Fri, 07 Feb 2025 17:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 7.8, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}

kev

{'dateAdded': '2022-03-15'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'active', 'Technical Impact': 'total'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: microsoft

Published: 2019-06-12T13:49:41.000Z

Updated: 2025-05-20T17:50:21.074Z

Reserved: 2018-11-26T00:00:00.000Z

Link: CVE-2019-1064

cve-icon Vulnrichment

Updated: 2024-08-04T18:06:31.506Z

cve-icon NVD

Status : Analyzed

Published: 2019-06-12T14:29:04.273

Modified: 2025-05-21T18:33:21.440

Link: CVE-2019-1064

cve-icon Redhat

No data.