vulnerability

Microsoft Windows: CVE-2019-0603: Windows Deployment Services TFTP Server Remote Code Execution Vulnerability

Severity
9
CVSS
(AV:N/AC:M/Au:S/C:C/I:C/A:C)
Published
Mar 12, 2019
Added
Mar 12, 2019
Modified
Sep 5, 2025

Description

A remote code execution vulnerability exists in the way that Windows Deployment Services TFTP Server handles objects in memory. An attacker who successfully exploited the vulnerability could execute arbitrary code with elevated permissions on a target system. To exploit the vulnerability, an attacker could create a specially crafted request, causing Windows to execute arbitrary code with elevated permissions. The security update addresses the vulnerability by correcting how Windows Deployment Services TFTP Server handles objects in memory, aka 'Windows Deployment Services TFTP Server Remote Code Execution Vulnerability'.

Solutions

microsoft-windows-windows_10-1607-kb4489882microsoft-windows-windows_10-1803-kb4489868microsoft-windows-windows_10-1809-kb4489899microsoft-windows-windows_server_2012-kb4489884microsoft-windows-windows_server_2012_r2-kb4489883microsoft-windows-windows_server_2016-1607-kb4489882microsoft-windows-windows_server_2019-1809-kb4489899msft-kb4489876-18f924a7-7f0d-4279-bf69-886bfa90a9ecmsft-kb4489876-81a89161-0a81-44b7-b3ce-b8c5cb877a47msft-kb4489876-c480ad4e-3b9e-4b62-b6ed-a4e00278a119msft-kb4489883-1e9a46e5-c67d-4806-8593-86b3bc55b0b2msft-kb4489883-bcd29f1b-390e-44e9-a525-9accf112de47msft-kb4489884-d1ff569c-adbc-446a-989a-cb2c1be01b6fmsft-kb4489884-f0b8e848-d79d-4bf2-a5a3-5e089b9ddb9fmsft-kb4489885-3ab93f71-ab60-4ee0-aa79-27ce364a30famsft-kb4489885-60a3929e-830c-42ff-adfc-1a96a1e0c62cmsft-kb4489885-73542c86-d962-40fa-b29f-cf79d99df0a8msft-kb4489885-8879d45b-1af9-44d4-bc42-a1b1094609b9msft-kb4489885-acf512a8-958c-4759-8464-caf71a59547amsft-kb4489885-f429ca5a-3698-46fa-91d7-8a2c7f0f6074
Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.