An elevation of privilege vulnerability exists in the way the Task Scheduler Service validates certain file operations. An attacker who successfully exploited the vulnerability could gain elevated privileges on a victim system. To exploit the vulnerability, an attacker would require unprivileged code execution on a victim system. The security update addresses the vulnerability by correctly validating file operations.
https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2019-1069
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1069
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2019-1069
https://blog.0patch.com/2019/06/another-task-scheduler-0day-another.html
Published: 2019-06-12
Updated: 2025-10-29
Named Vulnerability: bearlpeKnown Exploited Vulnerability (KEV)
Base Score: 7.2
Vector: CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C
Severity: High
Base Score: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Severity: High
EPSS: 0.27207