A security feature bypass vulnerability exists when Windows Secure Kernel Mode fails to properly handle objects in memory.
To exploit the vulnerability, a locally-authenticated attacker could attempt to run a specially crafted application on a targeted system. An attacker who successfully exploited the vulnerability could violate virtual trust levels (VTL).
The update addresses the vulnerability by correcting how Windows Secure Kernel Mode handles objects in memory to properly enforce VTLs.
References
Link | Resource |
---|---|
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2019-1044 | |
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1044 | Patch Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
20 May 2025, 18:15
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : 7.2
v3 : 5.3 |
Summary | (en) A security feature bypass vulnerability exists when Windows Secure Kernel Mode fails to properly handle objects in memory. To exploit the vulnerability, a locally-authenticated attacker could attempt to run a specially crafted application on a targeted system. An attacker who successfully exploited the vulnerability could violate virtual trust levels (VTL). The update addresses the vulnerability by correcting how Windows Secure Kernel Mode handles objects in memory to properly enforce VTLs. | |
References |
|
21 Nov 2024, 04:35
Type | Values Removed | Values Added |
---|---|---|
References | () https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1044 - Patch, Vendor Advisory |
Information
Published : 2019-06-12 14:29
Updated : 2025-05-20 18:15
NVD link : CVE-2019-1044
Mitre link : CVE-2019-1044
CVE.ORG link : CVE-2019-1044
JSON object : View
Products Affected
microsoft
- windows_10
- windows_server_2019
CWE