Show plain JSON{"containers": {"cna": {"affected": [{"product": "Windows", "vendor": "Microsoft", "versions": [{"status": "affected", "version": "10 Version 1703 for 32-bit Systems"}, {"status": "affected", "version": "10 Version 1703 for x64-based Systems"}, {"status": "affected", "version": "10 Version 1709 for 32-bit Systems"}, {"status": "affected", "version": "10 Version 1709 for x64-based Systems"}, {"status": "affected", "version": "10 Version 1803 for 32-bit Systems"}, {"status": "affected", "version": "10 Version 1803 for x64-based Systems"}, {"status": "affected", "version": "10 Version 1803 for ARM64-based Systems"}, {"status": "affected", "version": "10 Version 1809 for 32-bit Systems"}, {"status": "affected", "version": "10 Version 1809 for x64-based Systems"}, {"status": "affected", "version": "10 Version 1809 for ARM64-based Systems"}, {"status": "affected", "version": "10 Version 1709 for ARM64-based Systems"}]}, {"product": "Windows Server", "vendor": "Microsoft", "versions": [{"status": "affected", "version": "version 1803 (Core Installation)"}, {"status": "affected", "version": "2019"}, {"status": "affected", "version": "2019 (Core installation)"}]}, {"product": "Windows 10 Version 1903 for 32-bit Systems", "vendor": "Microsoft", "versions": [{"status": "affected", "version": "unspecified"}]}, {"product": "Windows 10 Version 1903 for x64-based Systems", "vendor": "Microsoft", "versions": [{"status": "affected", "version": "unspecified"}]}, {"product": "Windows 10 Version 1903 for ARM64-based Systems", "vendor": "Microsoft", "versions": [{"status": "affected", "version": "unspecified"}]}, {"product": "Windows Server, version 1903 (Server Core installation)", "vendor": "Microsoft", "versions": [{"status": "affected", "version": "unspecified"}]}], "descriptions": [{"lang": "en", "value": "An elevation of privilege vulnerability exists when the Windows AppX Deployment Server improperly handles junctions.To exploit this vulnerability, an attacker would first have to gain execution on the victim system, aka 'Windows Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2019-1215, CVE-2019-1278, CVE-2019-1303."}], "problemTypes": [{"descriptions": [{"description": "Elevation of Privilege", "lang": "en", "type": "text"}]}], "providerMetadata": {"dateUpdated": "2019-09-16T17:06:21.000Z", "orgId": "f38d906d-7342-40ea-92c1-6c4a2c6478c8", "shortName": "microsoft"}, "references": [{"tags": ["x_refsource_MISC"], "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1253"}, {"tags": ["x_refsource_MISC"], "url": "http://packetstormsecurity.com/files/154488/AppXSvc-17763.1.amd64fre.rs5_release.180914-1434-Privilege-Escalation.html"}], "x_legacyV4Record": {"CVE_data_meta": {"ASSIGNER": "secure@microsoft.com", "ID": "CVE-2019-1253", "STATE": "PUBLIC"}, "affects": {"vendor": {"vendor_data": [{"product": {"product_data": [{"product_name": "Windows", "version": {"version_data": [{"version_value": "10 Version 1703 for 32-bit Systems"}, {"version_value": "10 Version 1703 for x64-based Systems"}, {"version_value": "10 Version 1709 for 32-bit Systems"}, {"version_value": "10 Version 1709 for x64-based Systems"}, {"version_value": "10 Version 1803 for 32-bit Systems"}, {"version_value": "10 Version 1803 for x64-based Systems"}, {"version_value": "10 Version 1803 for ARM64-based Systems"}, {"version_value": "10 Version 1809 for 32-bit Systems"}, {"version_value": "10 Version 1809 for x64-based Systems"}, {"version_value": "10 Version 1809 for ARM64-based Systems"}, {"version_value": "10 Version 1709 for ARM64-based Systems"}]}}, {"product_name": "Windows Server", "version": {"version_data": [{"version_value": "version 1803 (Core Installation)"}, {"version_value": "2019"}, {"version_value": "2019 (Core installation)"}]}}, {"product_name": "Windows 10 Version 1903 for 32-bit Systems", "version": {"version_data": [{"version_value": ""}]}}, {"product_name": "Windows 10 Version 1903 for x64-based Systems", "version": {"version_data": [{"version_value": ""}]}}, {"product_name": "Windows 10 Version 1903 for ARM64-based Systems", "version": {"version_data": [{"version_value": ""}]}}, {"product_name": "Windows Server, version 1903 (Server Core installation)", "version": {"version_data": [{"version_value": ""}]}}]}, "vendor_name": "Microsoft"}]}}, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": {"description_data": [{"lang": "eng", "value": "An elevation of privilege vulnerability exists when the Windows AppX Deployment Server improperly handles junctions.To exploit this vulnerability, an attacker would first have to gain execution on the victim system, aka 'Windows Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2019-1215, CVE-2019-1278, CVE-2019-1303."}]}, "problemtype": {"problemtype_data": [{"description": [{"lang": "eng", "value": "Elevation of Privilege"}]}]}, "references": {"reference_data": [{"name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1253", "refsource": "MISC", "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1253"}, {"name": "http://packetstormsecurity.com/files/154488/AppXSvc-17763.1.amd64fre.rs5_release.180914-1434-Privilege-Escalation.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/154488/AppXSvc-17763.1.amd64fre.rs5_release.180914-1434-Privilege-Escalation.html"}]}}}, "adp": [{"providerMetadata": {"orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE", "dateUpdated": "2024-08-04T18:13:29.559Z"}, "title": "CVE Program Container", "references": [{"tags": ["x_refsource_MISC", "x_transferred"], "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1253"}, {"tags": ["x_refsource_MISC", "x_transferred"], "url": "http://packetstormsecurity.com/files/154488/AppXSvc-17763.1.amd64fre.rs5_release.180914-1434-Privilege-Escalation.html"}]}, {"metrics": [{"cvssV3_1": {"scope": "UNCHANGED", "version": "3.1", "baseScore": 7.8, "attackVector": "LOCAL", "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "integrityImpact": "HIGH", "userInteraction": "NONE", "attackComplexity": "LOW", "availabilityImpact": "HIGH", "privilegesRequired": "LOW", "confidentialityImpact": "HIGH"}}, {"other": {"type": "ssvc", "content": {"id": "CVE-2019-1253", "role": "CISA Coordinator", "options": [{"Exploitation": "active"}, {"Automatable": "no"}, {"Technical Impact": "total"}], "version": "2.0.3", "timestamp": "2025-02-07T16:08:58.756098Z"}}}, {"other": {"type": "kev", "content": {"dateAdded": "2022-03-15", "reference": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?search_api_fulltext=CVE-2019-1253"}}}], "problemTypes": [{"descriptions": [{"lang": "en", "type": "CWE", "cweId": "CWE-59", "description": "CWE-59 Improper Link Resolution Before File Access ('Link Following')"}]}], "title": "CISA ADP Vulnrichment", "providerMetadata": {"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP", "dateUpdated": "2025-02-07T16:18:12.281Z"}}]}, "cveMetadata": {"assignerOrgId": "f38d906d-7342-40ea-92c1-6c4a2c6478c8", "assignerShortName": "microsoft", "cveId": "CVE-2019-1253", "datePublished": "2019-09-11T21:24:59.000Z", "dateReserved": "2018-11-26T00:00:00.000Z", "dateUpdated": "2025-02-07T16:18:12.281Z", "state": "PUBLISHED"}, "dataType": "CVE_RECORD", "dataVersion": "5.1"}