8.8

CVE-2024-49039

Warning

Windows Task Scheduler Elevation of Privilege Vulnerability

Data is provided by the National Vulnerability Database (NVD)
MicrosoftWindows 10 1507 HwPlatformx64 Version < 10.0.10240.20826
MicrosoftWindows 10 1507 HwPlatformx86 Version < 10.0.10240.20826
MicrosoftWindows 10 1607 HwPlatformx64 Version < 10.0.14393.7515
MicrosoftWindows 10 1607 HwPlatformx86 Version < 10.0.14393.7515
MicrosoftWindows 10 1809 HwPlatformx64 Version < 10.0.17763.6532
MicrosoftWindows 10 1809 HwPlatformx86 Version < 10.0.17763.6532
MicrosoftWindows 10 21h2 HwPlatformarm64 Version < 10.0.19044.5131
MicrosoftWindows 10 21h2 HwPlatformx64 Version < 10.0.19044.5131
MicrosoftWindows 10 21h2 HwPlatformx86 Version < 10.0.19044.5131
MicrosoftWindows 10 22h2 HwPlatformarm64 Version < 10.0.19045.5131
MicrosoftWindows 10 22h2 HwPlatformx64 Version < 10.0.19045.5131
MicrosoftWindows 10 22h2 HwPlatformx86 Version < 10.0.19045.5131
MicrosoftWindows 11 22h2 HwPlatformarm64 Version < 10.0.22621.4460
MicrosoftWindows 11 22h2 HwPlatformx64 Version < 10.0.22621.4460
MicrosoftWindows 11 23h2 HwPlatformarm64 Version < 10.0.22631.4460
MicrosoftWindows 11 23h2 HwPlatformx64 Version < 10.0.22631.4460
MicrosoftWindows 11 24h2 HwPlatformarm64 Version < 10.0.26100.2314
MicrosoftWindows 11 24h2 HwPlatformx64 Version < 10.0.26100.2314
MicrosoftWindows Server 2016 Version < 10.0.14393.7515
MicrosoftWindows Server 2019 Version < 10.0.17763.6532
MicrosoftWindows Server 2022 Version < 10.0.20348.2849
MicrosoftWindows Server 2022 23h2 Version < 10.0.25398.1251
MicrosoftWindows Server 2025 Version < 10.0.26100.2314

12.11.2024: CISA Known Exploited Vulnerabilities (KEV) Catalog

Microsoft Windows Task Scheduler Privilege Escalation Vulnerability

Vulnerability

Microsoft Windows Task Scheduler contains a privilege escalation vulnerability that can allow an attacker-provided, local application to escalate privileges outside of its AppContainer, and access privileged RPC functions.

Description

Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

Required actions
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 44.98% 0.975
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
secure@microsoft.com 8.8 2 6
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
CWE-287 Improper Authentication

When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.