642
VMScore

CVE-2019-0797

Published: 09/04/2019 Updated: 24/08/2020
CVSS v2 Base Score: 7.2 | Impact Score: 10 | Exploitability Score: 3.9
CVSS v3 Base Score: 7.8 | Impact Score: 5.9 | Exploitability Score: 1.8
VMScore: 642
Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

An elevation of privilege vulnerability exists in Windows when the Win32k component fails to properly handle objects in memory, aka 'Win32k Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2019-0808.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

microsoft windows server 2016 1709

microsoft windows server 2012 -

microsoft windows 10 1709

microsoft windows 10 1809

microsoft windows 8.1 -

microsoft windows rt 8.1 -

microsoft windows server 2019 -

microsoft windows server 2016 -

microsoft windows 10 -

microsoft windows 10 1607

microsoft windows server 2016 1803

microsoft windows server 2012 r2

microsoft windows 10 1703

microsoft windows 10 1803

Github Repositories

panopticon-SandCat wwwsecurityweekcom/windows-zero-day-exploited-new-sandcat-group wwwsecurityweekcom/windows-zero-day-exploited-fruityarmor-sandcat-threat-groups securelistcom/cve-2019-0797-zero-day-vulnerability/89885/? arstechnicacom/information-technology/2019/10/kaspersky-finds-uzbekistan-hacking-opbecause-they-used-kaspersky-av/

FruityArmor wwwsecurityweekcom/microsoft-patches-windows-zero-day-exploited-fruityarmor-group wwwsecurityweekcom/windows-zero-day-exploited-attacks-aimed-middle-east wwwsecurityweekcom/windows-zero-day-exploited-new-sandcat-group wwwsecurityweekcom/windows-zero-day-exploited-fruityarmor-sandcat-threat-groups securelistcom/cve-201

Recent Articles

Microsoft Patch Tuesday – March 2019
Symantec Threat Intelligence Blog • Ratheesh PM • 13 Mar 2024

This month the vendor has patched 64 vulnerabilities, 17 of which are rated Critical.

Posted: 13 Mar, 201920 Min ReadThreat Intelligence SubscribeFollowtwitterfacebooklinkedinMicrosoft Patch Tuesday – March 2019This month the vendor has patched 64 vulnerabilities, 17 of which are rated Critical.As always, customers are advised to follow these security best practices: Install vendor patches as soon as they are available. Run all software with the least privileges required while still maintaining functionality. Avoid handlin...

APT review: what the world’s threat actors got up to in 2019
Securelist • David Emm • 04 Dec 2019

What were the most interesting developments in terms of APT activity during the year and what can we learn from them? This is not an easy question to answer, because researchers have only partial visibility and it´s impossible to fully understand the motivation for some attacks or the developments behind them. However, let´s try to approach the problem from different angles in order to get a better understanding of what happened with the benefit of hindsight and perspective. Targeting supply c...

IT threat evolution Q1 2019
Securelist • David Emm • 23 May 2019

Zebrocy was first observed being used as a Sofacy backdoor in 2015. However, the collection of cases where this tool has been used mean that we consider it a subset of activity in its own right. On the basis of this threat actor’s past behaviour, we predicted last year that Zebrocy would continue to innovate in its malware development. The group has developed using Delphi, AutoIT, .NET, C# and PowerShell. Since May 2018, Zebrocy has added the “Go” language to its arsenal – the first time...

IT threat evolution Q1 2019. Statistics
Securelist • Victor Chebyshev Fedor Sinitsyn Denis Parinov Boris Larin Oleg Kupreev Evgeny Lopatin • 23 May 2019

These statistics are based on detection verdicts of Kaspersky Lab products received from users who consented to provide statistical data. According to Kaspersky Security Network, Q1 2019 is remembered mainly for mobile financial threats. First, the operators of the Russia-targeting Asacub Trojan made several large-scale distribution attempts, reaching up to 13,000 unique users per day. The attacks used active bots to send malicious links to contacts in already infected smartphones. The mailings ...

APT trends report Q1 2019
Securelist • GReAT • 30 Apr 2019

For just under two years, the Global Research and Analysis Team (GReAT) at Kaspersky Lab has been publishing quarterly summaries of advanced persistent threat (APT) activity. The summaries are based on our threat intelligence research and provide a representative snapshot of what we have published and discussed in greater detail in our private APT reports. They aim to highlight the significant events and findings that we feel people should be aware of. This is our latest installment, focusing on...

The fourth horseman: CVE-2019-0797 vulnerability
Securelist • Vasily Berdnikov Boris Larin • 13 Mar 2019

In February 2019, our Automatic Exploit Prevention (AEP) systems detected an attempt to exploit a vulnerability in the Microsoft Windows operating system. Further analysis of this event led to us discovering a zero-day vulnerability in win32k.sys. We reported it to Microsoft on February 22, 2019. The company confirmed the vulnerability and assigned it CVE-2019-0797. Microsoft have just released a patch, crediting Kaspersky Lab researchers Vasiliy Berdnikov and Boris Larin with the discovery: Thi...

Microsoft changes DHCP to 'Dammit! Hacked! Compromised! Pwned!' Big bunch of security fixes land for Windows
The Register • Shaun Nichols in San Francisco • 12 Mar 2019

DHCP client has trio of remote-code exec vulns – plus SAP, Adobe issue updates

Patch Tuesday It's the second Tuesday of the month, and you know what that means: a fresh dump of security fixes from Microsoft, Adobe and others. The March edition of Patch Tuesday includes fixes for 64 CVE-listed vulnerabilities, while Adobe addressed a pair of bugs in Photoshop and Digital Editions. Even SAP has got in on the game. You should review the updates, test them if necessary or able to, and install them as soon as possible, to avoid running into miscreants exploiting them to comprom...