CVE-2019-0948

medium

Description

An information disclosure vulnerability exists in the Windows Event Viewer (eventvwr.msc) when it improperly parses XML input containing a reference to an external entity. An attacker who successfully exploited this vulnerability could read arbitrary files via an XML external entity (XXE) declaration. To exploit the vulnerability, an attacker could create a file containing specially crafted XML content and convince an authenticated user to import the file. The update addresses the vulnerability by modifying the way that the Event Viewer parses XML input.

References

https://www.tenable.com/blog/tenable-roundup-for-microsofts-june-2019-patch-tuesday

https://www.zerodayinitiative.com/advisories/ZDI-19-641/

https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0948

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2019-0948

Details

Source: Mitre, NVD

Published: 2019-06-12

Updated: 2025-05-20

Risk Information

CVSS v2

Base Score: 4.3

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:N/A:N

Severity: Medium

CVSS v3

Base Score: 4.7

Vector: CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N

Severity: Medium

EPSS

EPSS: 0.42373