
Cloud Vulnerability DB
An open project to list all known cloud vulnerabilities and Cloud Service Provider security issues
Windows Task Scheduler Elevation of Privilege Vulnerability (CVE-2024-49039) was disclosed in November 2024. This vulnerability affects Microsoft Windows Task Scheduler and allows attackers to elevate privileges on targeted systems. The vulnerability was discovered by multiple researchers, including members of Google's Threat Analysis Group (TAG), and has been actively exploited in the wild (Help Net Security, Tenable Blog).
The vulnerability has been assigned a CVSSv3 score of 8.8 and is rated as important. It allows an AppContainer escape, enabling a low-privileged user to execute code at Medium integrity level. The bug specifically allows attackers to access resources that would otherwise be unavailable to them and execute code, such as remote procedure call (RPC) functions. Successful exploitation requires local access to a vulnerable system and the ability to run a specially crafted application (Help Net Security, Tenable Blog).
When successfully exploited, the vulnerability enables attackers to elevate their privileges and gain access to resources that would normally be restricted. This allows them to execute code with higher privileges and potentially perform remote procedure call (RPC) functions, significantly expanding their capabilities within the compromised system (Help Net Security).
Microsoft has released patches for this vulnerability as part of its November 2024 Patch Tuesday update. Organizations are advised to apply the available security updates as soon as possible to protect against potential exploitation (Tenable Blog).
The security community has noted the significance of this vulnerability, particularly due to its active exploitation in the wild and potential connection to APT activities. The involvement of Google's Threat Analysis Group in its discovery has drawn attention to its potential use in targeted attacks (Help Net Security).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
An open project to list all known cloud vulnerabilities and Cloud Service Provider security issues
A comprehensive threat intelligence database of cloud security incidents, actors, tools and techniques
A step-by-step framework for modeling and improving SaaS and PaaS tenant isolation
Get a personalized demo
“Best User Experience I have ever seen, provides full visibility to cloud workloads.”
“Wiz provides a single pane of glass to see what is going on in our cloud environments.”
“We know that if Wiz identifies something as critical, it actually is.”