CVE-2019-1322 (CNNVD-201910-438)
HIGH
有利用代码
中文标题:
Microsoft Windows和Microsoft Windows Server 授权问题漏洞
英文标题:
An elevation of privilege vulnerability exists when Windows improperly handles authentication reques...
CVSS分数:
7.8
发布时间:
2019-10-10 13:28:41
漏洞类型:
授权问题
状态:
PUBLISHED
数据质量分数:
0.40
数据版本:
v5
漏洞描述
中文描述:
Microsoft Windows和Microsoft Windows Server都是美国微软(Microsoft)公司的产品。Microsoft Windows是一套个人设备使用的操作系统。Microsoft Windows Server是一套服务器操作系统。 Microsoft Windows和Microsoft Windows Server中存在授权问题漏洞,该漏洞源于程序没有正确处理身份验证请求。攻击者可通过运行特制的应用程序利用该漏洞以较高的权限执行任意代码。以下产品及版本受到影响:Microsoft Windows 10版本1803,Windows 10版本1809,Windows 10版本1809,Windows Server 2019,Windows Server版本1803,Windows Server版本1903。
英文描述:
An elevation of privilege vulnerability exists when Windows improperly handles authentication requests, aka 'Microsoft Windows Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2019-1320, CVE-2019-1340.
CWE类型:
(暂无数据)
标签:
local
windows
TomahawkAPT69
Metasploit
受影响产品
| 厂商 | 产品 | 版本 | 版本范围 | 平台 | CPE |
|---|---|---|---|---|---|
| Microsoft | Windows | 10 Version 1803 for 32-bit Systems | - | - |
cpe:2.3:a:microsoft:windows:10_version_1803_for_32-bit_systems:*:*:*:*:*:*:*
|
| Microsoft | Windows | 10 Version 1803 for x64-based Systems | - | - |
cpe:2.3:a:microsoft:windows:10_version_1803_for_x64-based_systems:*:*:*:*:*:*:*
|
| Microsoft | Windows | 10 Version 1803 for ARM64-based Systems | - | - |
cpe:2.3:a:microsoft:windows:10_version_1803_for_arm64-based_systems:*:*:*:*:*:*:*
|
| Microsoft | Windows | 10 Version 1809 for 32-bit Systems | - | - |
cpe:2.3:a:microsoft:windows:10_version_1809_for_32-bit_systems:*:*:*:*:*:*:*
|
| Microsoft | Windows | 10 Version 1809 for x64-based Systems | - | - |
cpe:2.3:a:microsoft:windows:10_version_1809_for_x64-based_systems:*:*:*:*:*:*:*
|
| Microsoft | Windows | 10 Version 1809 for ARM64-based Systems | - | - |
cpe:2.3:a:microsoft:windows:10_version_1809_for_arm64-based_systems:*:*:*:*:*:*:*
|
| Microsoft | Windows Server | version 1803 (Core Installation) | - | - |
cpe:2.3:a:microsoft:windows_server:version_1803__(core_installation):*:*:*:*:*:*:*
|
| Microsoft | Windows Server | 2019 | - | - |
cpe:2.3:a:microsoft:windows_server:2019:*:*:*:*:*:*:*
|
| Microsoft | Windows Server | 2019 (Core installation) | - | - |
cpe:2.3:a:microsoft:windows_server:2019__(core_installation):*:*:*:*:*:*:*
|
| Microsoft | Windows 10 Version 1903 for 32-bit Systems | unspecified | - | - |
cpe:2.3:a:microsoft:windows_10_version_1903_for_32-bit_systems:unspecified:*:*:*:*:*:*:*
|
| Microsoft | Windows 10 Version 1903 for x64-based Systems | unspecified | - | - |
cpe:2.3:a:microsoft:windows_10_version_1903_for_x64-based_systems:unspecified:*:*:*:*:*:*:*
|
| Microsoft | Windows 10 Version 1903 for ARM64-based Systems | unspecified | - | - |
cpe:2.3:a:microsoft:windows_10_version_1903_for_arm64-based_systems:unspecified:*:*:*:*:*:*:*
|
| Microsoft | Windows Server, version 1903 (Server Core installation) | unspecified | - | - |
cpe:2.3:a:microsoft:windows_server,_version_1903_(server_core_installation):unspecified:*:*:*:*:*:*:*
|
| microsoft | windows_10_1803 | - | - | - |
cpe:2.3:o:microsoft:windows_10_1803:-:*:*:*:*:*:arm64:*
|
| microsoft | windows_10_1809 | - | - | - |
cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:arm64:*
|
| microsoft | windows_10_1903 | - | - | - |
cpe:2.3:o:microsoft:windows_10_1903:-:*:*:*:*:*:arm64:*
|
| microsoft | windows_server_1803 | - | - | - |
cpe:2.3:o:microsoft:windows_server_1803:-:*:*:*:*:*:x64:*
|
| microsoft | windows_server_1903 | - | - | - |
cpe:2.3:o:microsoft:windows_server_1903:-:*:*:*:*:*:x64:*
|
| microsoft | windows_server_2019 | - | - | - |
cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*
|
解决方案
中文解决方案:
(暂无数据)
英文解决方案:
(暂无数据)
临时解决方案:
(暂无数据)
参考链接
无标题
x_refsource_MISC
cve.org
访问
cve.org
无标题
x_refsource_MISC
cve.org
访问
cve.org
134c704f-9b21-4f2e-91b3-4a467353bcc0
OTHER
nvd.nist.gov
访问
nvd.nist.gov
ExploitDB EDB-47684
EXPLOIT
exploitdb
访问
exploitdb
Download Exploit EDB-47684
EXPLOIT
exploitdb
访问
exploitdb
CVE Reference: CVE-2019-1405
ADVISORY
cve.org
访问
cve.org
CVE Reference: CVE-2019-1322
ADVISORY
cve.org
访问
cve.org
ExploitDB EDB-47805
EXPLOIT
exploitdb
访问
exploitdb
Download Exploit EDB-47805
EXPLOIT
exploitdb
访问
exploitdb
CVSS评分详情
3.1 (adp)
HIGH
7.8
CVSS向量:
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
机密性
HIGH
完整性
HIGH
可用性
HIGH
时间信息
发布时间:
2019-10-10 13:28:41
修改时间:
2025-10-21 23:45:29
创建时间:
2025-11-11 15:35:31
更新时间:
2025-11-11 16:53:02
利用信息
此漏洞有可利用代码!
利用代码数量:
2
利用来源:
未知
未知
数据源详情
| 数据源 | 记录ID | 版本 | 提取时间 |
|---|---|---|---|
| CVE | cve_CVE-2019-1322 |
2025-11-11 15:20:08 | 2025-11-11 07:35:31 |
| NVD | nvd_CVE-2019-1322 |
2025-11-11 14:56:27 | 2025-11-11 07:44:04 |
| CNNVD | cnnvd_CNNVD-201910-438 |
2025-11-11 15:10:17 | 2025-11-11 07:55:04 |
| EXPLOITDB | exploitdb_EDB-47684 |
2025-11-11 15:05:53 | 2025-11-11 08:52:46 |
| EXPLOITDB | exploitdb_EDB-47805 |
2025-11-11 15:05:53 | 2025-11-11 08:53:02 |
版本与语言
当前版本:
v5
主要语言:
EN
支持语言:
EN
ZH
其他标识符:
:
:
:
:
安全公告
暂无安全公告信息
变更历史
v5
EXPLOITDB
2025-11-11 16:53:02
references_count: 7 → 9; tags_count: 3 → 4
查看详细变更
- references_count: 7 -> 9
- tags_count: 3 -> 4
v4
EXPLOITDB
2025-11-11 16:52:46
references_count: 3 → 7; tags_count: 0 → 3; data_sources: ['cnnvd', 'cve', 'nvd'] → ['cnnvd', 'cve', 'exploitdb', 'nvd']
查看详细变更
- references_count: 3 -> 7
- tags_count: 0 -> 3
- data_sources: ['cnnvd', 'cve', 'nvd'] -> ['cnnvd', 'cve', 'exploitdb', 'nvd']
v3
CNNVD
2025-11-11 15:55:04
vulnerability_type: 未提取 → 授权问题; cnnvd_id: 未提取 → CNNVD-201910-438; data_sources: ['cve', 'nvd'] → ['cnnvd', 'cve', 'nvd']
查看详细变更
- vulnerability_type: 未提取 -> 授权问题
- cnnvd_id: 未提取 -> CNNVD-201910-438
- data_sources: ['cve', 'nvd'] -> ['cnnvd', 'cve', 'nvd']
v2
NVD
2025-11-11 15:44:04
affected_products_count: 13 → 19; references_count: 2 → 3; data_sources: ['cve'] → ['cve', 'nvd']
查看详细变更
- affected_products_count: 13 -> 19
- references_count: 2 -> 3
- data_sources: ['cve'] -> ['cve', 'nvd']