A security feature bypass vulnerability exists in Microsoft Windows when the Task Scheduler service fails to properly verify client connections over RPC, aka Windows Task Scheduler Security Feature Bypass Vulnerability.
The product does not validate, or incorrectly validates, a certificate.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Windows_10 | Microsoft | - (including) | - (including) |
Windows_10 | Microsoft | 1607 (including) | 1607 (including) |
Windows_10 | Microsoft | 1709 (including) | 1709 (including) |
Windows_10 | Microsoft | 1803 (including) | 1803 (including) |
Windows_10 | Microsoft | 1809 (including) | 1809 (including) |
Windows_10 | Microsoft | 1903 (including) | 1903 (including) |
Windows_10 | Microsoft | 1909 (including) | 1909 (including) |
Windows_7 | Microsoft | –sp1 (including) | –sp1 (including) |
Windows_8.1 | Microsoft | - (including) | - (including) |
Windows_rt_8.1 | Microsoft | - (including) | - (including) |
Windows_server_2008 | Microsoft | –sp2 (including) | –sp2 (including) |
Windows_server_2012 | Microsoft | - (including) | - (including) |
Windows_server_2012 | Microsoft | r2 (including) | r2 (including) |
Windows_server_2016 | Microsoft | - (including) | - (including) |
Windows_server_2019 | Microsoft | - (including) | - (including) |
Windows_server_2019 | Microsoft | 1903 (including) | 1903 (including) |
Windows_server_2019 | Microsoft | 1909 (including) | 1909 (including) |