Overview
Microsoft Windows Task Scheduler contains a privilege escalation vulnerability that can allow an attacker-provided, local application to escalate privileges outside of its AppContainer, and access privileged RPC functions.
https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2024-49039 ; https://nvd.nist.gov/vuln/detail/CVE-2024-49039
Key Details
| Property | Value |
|---|---|
| CVE ID | CVE-2024-49039 |
| Vendor / Product | Microsoft — Windows |
| NVD Published | 2024-11-12 |
| NVD Last Modified | 2025-10-28 |
| CVSS 3.1 Score | 8.8 |
| CVSS 3.1 Vector | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H |
| Severity | HIGH |
| CWE | CWE-287 |
| CISA KEV Added | 2024-11-12 |
| CISA KEV Deadline | 2024-12-03 |
| Known Ransomware Use | ⚠️ Yes |
CVSS 3.1 Breakdown
Attack Vector
Local
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Changed
Confidentiality
High
Integrity
High
Availability
High
Required Action
CISA BOD 22-01 Deadline: 2024-12-03.
Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
Timeline
| Date | Event |
|---|---|
| 2024-11-12 | Added to CISA Known Exploited Vulnerabilities catalog |
| 2024-12-03 | CISA BOD 22-01 remediation deadline |
References
| Resource | Type |
|---|---|
| NVD — CVE-2024-49039 | Vulnerability Database |
| CISA KEV Catalog Entry | US Government |