Description
An elevation of privilege exists in the p2pimsvc service where an attacker who successfully exploited the vulnerability could run arbitrary code with elevated privileges.
To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that could exploit the vulnerability and take control of an affected system.
The update addresses this vulnerability by correcting how the p2pimsvc service handles processes these requests.
To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that could exploit the vulnerability and take control of an affected system.
The update addresses this vulnerability by correcting how the p2pimsvc service handles processes these requests.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2019-9739 | An elevation of privilege exists in the p2pimsvc service where an attacker who successfully exploited the vulnerability could run arbitrary code with elevated privileges. To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that could exploit the vulnerability and take control of an affected system. The update addresses this vulnerability by correcting how the p2pimsvc service handles processes these requests. |
References
History
Fri, 20 Feb 2026 21:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | An elevation of privilege exists in the p2pimsvc service where an attacker who successfully exploited the vulnerability could run arbitrary code with elevated privileges. To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that could exploit the vulnerability and take control of an affected system. The update addresses this vulnerability by correcting how the p2pimsvc service handles processes these requests. | An elevation of privilege exists in the p2pimsvc service where an attacker who successfully exploited the vulnerability could run arbitrary code with elevated privileges. To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that could exploit the vulnerability and take control of an affected system. The update addresses this vulnerability by correcting how the p2pimsvc service handles processes these requests. |
Subscriptions
Microsoft
Subscribe
Windows 10
Subscribe
Windows 10 1507
Subscribe
Windows 10 1607
Subscribe
Windows 10 1803
Subscribe
Windows 10 1809
Subscribe
Windows 7
Subscribe
Windows 8.1
Subscribe
Windows Rt 8.1
Subscribe
Windows Server 1803
Subscribe
Windows Server 1903
Subscribe
Windows Server 2008
Subscribe
Windows Server 2008 R2
Subscribe
Windows Server 2008 Sp2
Subscribe
Windows Server 2012
Subscribe
Windows Server 2012 R2
Subscribe
Windows Server 2016
Subscribe
Windows Server 2019
Subscribe
Status: PUBLISHED
Assigner: microsoft
Published:
Updated: 2024-08-04T18:06:31.777Z
Reserved: 2018-11-26T00:00:00.000Z
Link: CVE-2019-1168
No data.
Status : Modified
Published: 2019-08-14T21:15:15.860
Modified: 2026-02-20T21:18:38.523
Link: CVE-2019-1168
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD