|Title||(MS16-130) Microsoft Windows Task Scheduler Privilege Escalation (3199172)|
|Description||A vulnerability in some versions of Microsoft Windows could lead to privilege escalation.|
|Observation||A vulnerability in some versions of Microsoft Windows could lead to privilege escalation.
The flaw lies in the Task Scheduler component. Successful exploitation could allow a local user to gain elevated privileges. The exploit requires the attacker to have valid credentials to the vulnerable system.
|Recommendation||The vendor has released an update to address this issue.
Superseded patch information:
The patches for the following products are superseded by patches provided in: MS17-001
- Cumulative Update for Windows 10 (KB3210720): KB3210720
- Cumulative Update for Windows 10 Version 1511 (KB3210721): KB3210721
- Cumulative Update for Windows 10 Version 1511 for x64-based Systems (KB3210721): KB3210721
- Cumulative Update for Windows 10 Version 1607 (KB3213986): KB3213986
|Attack Vector||Malicious remote network traffic|
|Created At||2016-11-08 00:00:00 UTC|
|Updated At||2017-02-16 15:09:50 UTC|