vulnerability
Microsoft Windows: CVE-2019-0683: Active Directory Elevation of Privilege Vulnerability
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 4 | (AV:N/AC:M/Au:N/C:N/I:P/A:N) | Mar 12, 2019 | Mar 12, 2019 | Sep 5, 2025 |
Severity
4
CVSS
(AV:N/AC:M/Au:N/C:N/I:P/A:N)
Published
Mar 12, 2019
Added
Mar 12, 2019
Modified
Sep 5, 2025
Description
An elevation of privilege vulnerability exists in Active Directory Forest trusts due to a default setting that lets an attacker in the trusting forest request delegation of a TGT for an identity from the trusted forest, aka 'Active Directory Elevation of Privilege Vulnerability'.
Solutions
microsoft-windows-windows_10-1507-kb4507458microsoft-windows-windows_10-1607-kb4507460microsoft-windows-windows_10-1703-kb4507450microsoft-windows-windows_10-1709-kb4507455microsoft-windows-windows_10-1803-kb4507435microsoft-windows-windows_10-1809-kb4507469microsoft-windows-windows_10-1903-kb4507453microsoft-windows-windows_server_2012-kb4507464microsoft-windows-windows_server_2012_r2-kb4507457microsoft-windows-windows_server_2016-1607-kb4507460microsoft-windows-windows_server_2019-1809-kb4507469msft-kb4489876-18f924a7-7f0d-4279-bf69-886bfa90a9ecmsft-kb4489876-81a89161-0a81-44b7-b3ce-b8c5cb877a47msft-kb4489876-c480ad4e-3b9e-4b62-b6ed-a4e00278a119msft-kb4489885-3ab93f71-ab60-4ee0-aa79-27ce364a30famsft-kb4489885-60a3929e-830c-42ff-adfc-1a96a1e0c62cmsft-kb4489885-73542c86-d962-40fa-b29f-cf79d99df0a8msft-kb4489885-8879d45b-1af9-44d4-bc42-a1b1094609b9msft-kb4489885-acf512a8-958c-4759-8464-caf71a59547amsft-kb4489885-f429ca5a-3698-46fa-91d7-8a2c7f0f6074msft-kb4497936-10429ff2-9c14-4fb1-abdc-a105642cb1admsft-kb4499158-93082475-fee3-46cf-8c33-1d26b56c536fmsft-kb4499158-b4ae50b9-4f14-4eaf-8574-6b7a66beb9cbmsft-kb4499165-4b02df8e-e169-4d3a-a07e-bff78bc2efe3msft-kb4499165-b6296768-ff16-4e28-aa22-9e8938569154msft-kb4499175-5e4e9777-acaf-4485-b181-342ed54243e0msft-kb4499175-80f959d7-d6e8-444f-a157-d96e403b7cd7msft-kb4499175-b2b4e1dd-97d2-4352-b3c6-e8b8ceefeeeamsft-kb4499175-c723d22f-c1f5-4e53-973c-5991b24ddd48msft-kb4499175-e833c2ff-5588-4831-a96b-9fffb35bf3cemsft-kb4499175-f655d609-7d57-4c77-9e8a-a59a2dbeaa80msft-kb4507453-8cedcb21-0200-433d-b32d-2d5ef741adecmsft-kb4507456-256714d3-2030-469c-8c6a-f30ff5ea5a10msft-kb4507456-5c94bfe0-3546-493d-8de2-61342cbf5b96msft-kb4507456-7cdee6a8-6f30-423e-b02c-3453e14e3a6emsft-kb4507456-8ef94183-d630-48d8-8a60-d1a66f5bf53dmsft-kb4507456-a1f24376-4aff-404e-bb04-f6d00686d6dcmsft-kb4507456-df8085cf-9e2a-463b-92f3-e8c2dd920fe0msft-kb4507461-585d930e-fe25-4ca6-ad2f-8ec034309c40msft-kb4507461-6e49345e-8807-48dd-be6d-fb5433bcddcdmsft-kb4507461-f8662637-4580-4357-90a2-1e71f6c51021
References
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.