MS.RPC.StorSvc.Privilege.Escalation
Description
This indicates an attack attempt to exploit an Elevation of Privilege vulnerability in Microsoft Windows Storage Setting Service (StorSvc).
The vulnerability is due to user impersonation when the service attempts to create predictable files or folders that can be manipulated by symlink. Any unprivileged user is allowed to escalate their privilege upon successful exploitation.
Affected Products
Windows 10 for 32-bit Systems
Windows 10 for x64-based Systems
Windows Server 2016
Windows 10 Version 1607 for 32-bit Systems
Windows 10 Version 1607 for x64-based Systems
Windows Server 2016 (Server Core installation)
Windows 10 Version 1703 for 32-bit Systems
Windows 10 Version 1703 for x64-based Systems
Windows 10 Version 1709 for 32-bit Systems
Windows 10 Version 1709 for x64-based Systems
Windows Server, version 1709 (Server Core Installation)
Windows 10 Version 1803 for 32-bit Systems
Windows 10 Version 1803 for x64-based Systems
Windows Server, version 1803 (Server Core Installation)
Windows 10 Version 1803 for ARM64-based Systems
Impact
Privilege Escalation: Remote attackers can leverage their privileges on vulnerable systems.
Recommended Actions
Apply the most recent upgrade or patch from the vendor.
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0659
Telemetry
Coverage
IPS (Regular DB) | |
IPS (Extended DB) |