CVE-2019-1028

high

Description

An elevation of privilege exists in Windows Audio Service. An attacker who successfully exploited the vulnerability could run arbitrary code with elevated privileges. To exploit the vulnerability, an attacker could run a specially crafted application that could exploit the vulnerability. This vulnerability by itself does not allow arbitrary code to be run. However, this vulnerability could be used in conjunction with one or more vulnerabilities (e.g. a remote code execution vulnerability and another elevation of privilege) that could take advantage of the elevated privileges when running. The update addresses the vulnerability by correcting how the Windows Audio Service handles processes these requests.

References

https://www.tenable.com/blog/tenable-roundup-for-microsofts-june-2019-patch-tuesday

https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1028

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2019-1028

Details

Source: Mitre, NVD

Published: 2019-06-12

Updated: 2025-05-20

Risk Information

CVSS v2

Base Score: 4.6

Vector: CVSS2#AV:L/AC:L/Au:N/C:P/I:P/A:P

Severity: Medium

CVSS v3

Base Score: 7.8

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Severity: High

EPSS

EPSS: 0.00278