CVE-2019-0859

HIGH
2019-04-09 [email protected]
7.8
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Attack Vector
Local
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High

Lifecycle Timeline

4
Analysis Generated
Mar 26, 2026 - 11:18 vuln.today
Patch Released
Oct 29, 2025 - 14:40 nvd
Patch available
Added to CISA KEV
Oct 29, 2025 - 14:40 cisa
CISA KEV
CVE Published
Apr 09, 2019 - 21:29 nvd
HIGH 7.8

Description

An elevation of privilege vulnerability exists in Windows when the Win32k component fails to properly handle objects in memory, aka 'Win32k Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2019-0685, CVE-2019-0803.

Analysis

Windows Win32k contains a use-after-free vulnerability enabling local privilege escalation to SYSTEM, exploited in the wild in April 2019 alongside CVE-2019-0803 in targeted campaigns.

Technical Context

The use-after-free in win32k.sys occurs during window object destruction. A crafted application can trigger the free-and-reuse condition to gain arbitrary kernel write primitives for privilege escalation.

Affected Products

['Multiple Windows versions affected']

Remediation

Apply Microsoft security update. Implement kernel exploit protection via Windows Defender Exploit Guard ASR rules.

Priority Score

109
Low Medium High Critical
KEV: +50
EPSS: +9.9
CVSS: +39
POC: 0

Share

CVE-2019-0859 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy