Nov 2024: Windows Task Scheduler Elevation of Privilege Vulnerability
CVE-2024-49039 Published on November 12, 2024
Windows Task Scheduler Elevation of Privilege Vulnerability
Windows Task Scheduler Elevation of Privilege Vulnerability
Known Exploited Vulnerability
This Microsoft Windows Task Scheduler Privilege Escalation Vulnerability is part of CISA's list of Known Exploited Vulnerabilities. Microsoft Windows Task Scheduler contains a privilege escalation vulnerability that can allow an attacker-provided, local application to escalate privileges outside of its AppContainer, and access privileged RPC functions.
The following remediation steps are recommended / required by December 3, 2024: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
Weakness Type
What is an authentification Vulnerability?
When an actor claims to have a given identity, the software does not prove or insufficiently proves that the claim is correct.
CVE-2024-49039 has been classified to as an authentification vulnerability or weakness.
Products Associated with CVE-2024-49039
Want to know whenever a new CVE is published for Microsoft products? stack.watch will email you.
Affected Versions
Microsoft Windows Server 2025:- Version 10.0.26100.0 and below 10.0.26100.2314 is affected.
- Version 10.0.26100.0 and below 10.0.26100.2314 is affected.
- Version 10.0.17763.0 and below 10.0.17763.6532 is affected.
- Version 10.0.17763.0 and below 10.0.17763.6532 is affected.
- Version 10.0.17763.0 and below 10.0.17763.6532 is affected.
- Version 10.0.20348.0 and below 10.0.20348.2849 is affected.
- Version 10.0.19043.0 and below 10.0.19044.5131 is affected.
- Version 10.0.22621.0 and below 10.0.22621.4460 is affected.
- Version 10.0.19045.0 and below 10.0.19045.5131 is affected.
- Version 10.0.22631.0 and below 10.0.22631.4460 is affected.
- Version 10.0.22631.0 and below 10.0.22631.4460 is affected.
- Version 10.0.25398.0 and below 10.0.25398.1251 is affected.
- Version 10.0.26100.0 and below 10.0.26100.2314 is affected.
- Version 10.0.10240.0 and below 10.0.10240.20826 is affected.
- Version 10.0.14393.0 and below 10.0.14393.7515 is affected.
- Version 10.0.14393.0 and below 10.0.14393.7515 is affected.
- Version 10.0.14393.0 and below 10.0.14393.7515 is affected.
Exploit Probability
EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.