An elevation of privilege exists in Windows Audio Service. An attacker who successfully exploited the vulnerability could run arbitrary code with elevated privileges. To exploit the vulnerability, an attacker could run a specially crafted application that could exploit the vulnerability. This vulnerability by itself does not allow arbitrary code to be run. However, this vulnerability could be used in conjunction with one or more vulnerabilities (e.g. a remote code execution vulnerability and another elevation of privilege) that could take advantage of the elevated privileges when running. The update addresses the vulnerability by correcting how the Windows Audio Service handles processes these requests.
https://www.tenable.com/blog/tenable-roundup-for-microsofts-june-2019-patch-tuesday
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1007
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2019-1007