vendor:
Windows 10
by:
7.5
CVSS
HIGH
Arbitrary DACL write
276
CWE
Product Name: Windows 10
Affected Version From: Windows 10
Affected Version To: Windows 10
Patch Exists: NO
Related CWE:
CPE: cpe:2.3:o:microsoft:windows_10
Platforms Tested: Windows 10
Task Scheduler .job import arbitrary DACL write
The vulnerability allows an attacker to import a .job file into the task scheduler on Windows 10, which results in a call to the '_SchRpcRegisterTask' RPC function. The function 'tsched::SetJobFileSecurityByName' in the task scheduler service impersonates itself (NT AUTHORITYSYSTEM) and calls 'SetSecurityInfo' on a task it created in c:windowssystem32tasks. This can be abused to modify the permissions of the task and potentially gain elevated privileges.
Mitigation:
To mitigate this vulnerability, it is recommended to update to the latest version of the operating system and apply any available security patches.