{"containers":{"cna":{"affected":[{"product":"Windows","vendor":"Microsoft","versions":[{"status":"affected","version":"10 for 32-bit Systems"},{"status":"affected","version":"10 for x64-based Systems"},{"status":"affected","version":"10 Version 1607 for 32-bit Systems"},{"status":"affected","version":"10 Version 1607 for x64-based Systems"},{"status":"affected","version":"7 for 32-bit Systems Service Pack 1"},{"status":"affected","version":"7 for x64-based Systems Service Pack 1"},{"status":"affected","version":"8.1 for 32-bit systems"},{"status":"affected","version":"8.1 for x64-based systems"},{"status":"affected","version":"RT 8.1"}]},{"product":"Windows Server","vendor":"Microsoft","versions":[{"status":"affected","version":"2016"},{"status":"affected","version":"2016  (Core installation)"},{"status":"affected","version":"2008 for 32-bit Systems Service Pack 2"},{"status":"affected","version":"2008 for 32-bit Systems Service Pack 2 (Core installation)"},{"status":"affected","version":"2008 for Itanium-Based Systems Service Pack 2"},{"status":"affected","version":"2008 for x64-based Systems Service Pack 2"},{"status":"affected","version":"2008 for x64-based Systems Service Pack 2 (Core installation)"},{"status":"affected","version":"2008 R2 for Itanium-Based Systems Service Pack 1"},{"status":"affected","version":"2008 R2 for x64-based Systems Service Pack 1"},{"status":"affected","version":"2008 R2 for x64-based Systems Service Pack 1 (Core installation)"},{"status":"affected","version":"2012"},{"status":"affected","version":"2012 (Core installation)"},{"status":"affected","version":"2012 R2"},{"status":"affected","version":"2012 R2 (Core installation)"}]}],"descriptions":[{"lang":"en","value":"An elevation of privilege vulnerability exists in Windows when the Win32k component fails to properly handle objects in memory, aka 'Win32k Elevation of Privilege Vulnerability'."}],"problemTypes":[{"descriptions":[{"description":"Elevation of Privilege","lang":"en","type":"text"}]}],"providerMetadata":{"dateUpdated":"2020-10-15T20:06:23.000Z","orgId":"f38d906d-7342-40ea-92c1-6c4a2c6478c8","shortName":"microsoft"},"references":[{"tags":["x_refsource_MISC"],"url":"https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1458"},{"tags":["x_refsource_MISC"],"url":"http://packetstormsecurity.com/files/156651/Microsoft-Windows-WizardOpium-Local-Privilege-Escalation.html"},{"tags":["x_refsource_MISC"],"url":"http://packetstormsecurity.com/files/159569/Microsoft-Windows-Uninitialized-Variable-Local-Privilege-Escalation.html"}],"x_legacyV4Record":{"CVE_data_meta":{"ASSIGNER":"secure@microsoft.com","ID":"CVE-2019-1458","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"Windows","version":{"version_data":[{"version_value":"10 for 32-bit Systems"},{"version_value":"10 for x64-based Systems"},{"version_value":"10 Version 1607 for 32-bit Systems"},{"version_value":"10 Version 1607 for x64-based Systems"},{"version_value":"7 for 32-bit Systems Service Pack 1"},{"version_value":"7 for x64-based Systems Service Pack 1"},{"version_value":"8.1 for 32-bit systems"},{"version_value":"8.1 for x64-based systems"},{"version_value":"RT 8.1"}]}},{"product_name":"Windows Server","version":{"version_data":[{"version_value":"2016"},{"version_value":"2016  (Core installation)"},{"version_value":"2008 for 32-bit Systems Service Pack 2"},{"version_value":"2008 for 32-bit Systems Service Pack 2 (Core installation)"},{"version_value":"2008 for Itanium-Based Systems Service Pack 2"},{"version_value":"2008 for x64-based Systems Service Pack 2"},{"version_value":"2008 for x64-based Systems Service Pack 2 (Core installation)"},{"version_value":"2008 R2 for Itanium-Based Systems Service Pack 1"},{"version_value":"2008 R2 for x64-based Systems Service Pack 1"},{"version_value":"2008 R2 for x64-based Systems Service Pack 1 (Core installation)"},{"version_value":"2012"},{"version_value":"2012 (Core installation)"},{"version_value":"2012 R2"},{"version_value":"2012 R2 (Core installation)"}]}}]},"vendor_name":"Microsoft"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"An elevation of privilege vulnerability exists in Windows when the Win32k component fails to properly handle objects in memory, aka 'Win32k Elevation of Privilege Vulnerability'."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"Elevation of Privilege"}]}]},"references":{"reference_data":[{"name":"https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1458","refsource":"MISC","url":"https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1458"},{"name":"http://packetstormsecurity.com/files/156651/Microsoft-Windows-WizardOpium-Local-Privilege-Escalation.html","refsource":"MISC","url":"http://packetstormsecurity.com/files/156651/Microsoft-Windows-WizardOpium-Local-Privilege-Escalation.html"},{"name":"http://packetstormsecurity.com/files/159569/Microsoft-Windows-Uninitialized-Variable-Local-Privilege-Escalation.html","refsource":"MISC","url":"http://packetstormsecurity.com/files/159569/Microsoft-Windows-Uninitialized-Variable-Local-Privilege-Escalation.html"}]}}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-04T18:20:28.010Z"},"title":"CVE Program Container","references":[{"tags":["x_refsource_MISC","x_transferred"],"url":"https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1458"},{"tags":["x_refsource_MISC","x_transferred"],"url":"http://packetstormsecurity.com/files/156651/Microsoft-Windows-WizardOpium-Local-Privilege-Escalation.html"},{"tags":["x_refsource_MISC","x_transferred"],"url":"http://packetstormsecurity.com/files/159569/Microsoft-Windows-Uninitialized-Variable-Local-Privilege-Escalation.html"}]},{"metrics":[{"cvssV3_1":{"scope":"UNCHANGED","version":"3.1","baseScore":7.8,"attackVector":"LOCAL","baseSeverity":"HIGH","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","integrityImpact":"HIGH","userInteraction":"NONE","attackComplexity":"LOW","availabilityImpact":"HIGH","privilegesRequired":"LOW","confidentialityImpact":"HIGH"}},{"other":{"type":"ssvc","content":{"id":"CVE-2019-1458","role":"CISA Coordinator","options":[{"Exploitation":"active"},{"Automatable":"no"},{"Technical Impact":"total"}],"version":"2.0.3","timestamp":"2025-02-07T15:28:14.475516Z"}}},{"other":{"type":"kev","content":{"dateAdded":"2022-01-10","reference":"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2019-1458"}}}],"references":[{"url":"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2019-1458","tags":["government-resource"]}],"problemTypes":[{"descriptions":[{"lang":"en","type":"CWE","description":"CWE-noinfo Not enough information"}]}],"timeline":[{"time":"2022-01-10T00:00:00.000Z","lang":"en","value":"CVE-2019-1458 added to CISA KEV"}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-10-21T23:35:56.426Z"}}]},"cveMetadata":{"assignerOrgId":"f38d906d-7342-40ea-92c1-6c4a2c6478c8","assignerShortName":"microsoft","cveId":"CVE-2019-1458","datePublished":"2019-12-10T21:40:57.000Z","dateReserved":"2018-11-26T00:00:00.000Z","dateUpdated":"2025-10-21T23:35:56.426Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"}