CVE-2024-49039

Microsoft Windows — Microsoft Windows Task Scheduler Privilege Escalation Vulnerability
⚠️ CVSS 3.1  8.8 / 10 — HIGH 🔴 CISA Known Exploited Vulnerability

Overview

Microsoft Windows Task Scheduler contains a privilege escalation vulnerability that can allow an attacker-provided, local application to escalate privileges outside of its AppContainer, and access privileged RPC functions.

https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2024-49039 ; https://nvd.nist.gov/vuln/detail/CVE-2024-49039

Key Details

PropertyValue
CVE ID CVE-2024-49039
Vendor / Product Microsoft — Windows
NVD Published2024-11-12
NVD Last Modified2025-10-28
CVSS 3.1 Score8.8
CVSS 3.1 VectorCVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
SeverityHIGH
CWE CWE-287
CISA KEV Added2024-11-12
CISA KEV Deadline2024-12-03
Known Ransomware Use ⚠️ Yes

CVSS 3.1 Breakdown

Attack Vector
Local
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Changed
Confidentiality
High
Integrity
High
Availability
High

Required Action

CISA BOD 22-01 Deadline: 2024-12-03. Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

Timeline

DateEvent
2024-11-12Added to CISA Known Exploited Vulnerabilities catalog
2024-12-03CISA BOD 22-01 remediation deadline

References

ResourceType
NVD — CVE-2024-49039 Vulnerability Database
CISA KEV Catalog Entry US Government