CVE-2019-0707

7.0 HIGH

📋 TL;DR

This is a local privilege escalation vulnerability in Windows NDIS driver where improper buffer length checking allows memory corruption. An attacker with local access can run a specially crafted application to gain elevated SYSTEM privileges. All Windows systems with vulnerable NDIS versions are affected.

💻 Affected Systems

Products:
  • Microsoft Windows
Versions: Windows 10 versions prior to 1903, Windows Server 2019 prior to 1903
Operating Systems: Windows 10, Windows Server 2019
Default Config Vulnerable: ⚠️ Yes
Notes: Requires local access; systems with vulnerable NDIS.sys versions are affected regardless of network configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attacker gains full SYSTEM privileges, enabling complete system compromise, persistence installation, credential theft, and lateral movement.

🟠

Likely Case

Local attacker elevates from standard user to SYSTEM privileges to install malware, disable security controls, or access protected resources.

🟢

If Mitigated

With proper patch management and least privilege principles, impact is limited to isolated systems with no administrative access for attackers.

🌐 Internet-Facing: LOW - This is a local privilege escalation requiring local access; not directly exploitable over the internet.
🏢 Internal Only: HIGH - Any compromised user account or malware with local execution can exploit this to gain full system control.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires local execution; exploit code has been published and integrated into penetration testing frameworks.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Windows 10 Version 1903 (May 2019 Update) and later

Vendor Advisory: https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0707

Restart Required: Yes

Instructions:

1. Apply Windows Update KB4497936 for Windows 10 Version 1809 or KB4497935 for Windows Server 2019. 2. Alternatively, upgrade to Windows 10 Version 1903 or later. 3. Restart system after patch installation.

🔧 Temporary Workarounds

Restrict local user privileges

windows

Implement least privilege by removing local administrator rights from standard users

Application control policies

windows

Use AppLocker or Windows Defender Application Control to block unauthorized applications

🧯 If You Can't Patch

  • Implement strict endpoint detection and response (EDR) to detect privilege escalation attempts
  • Segment networks to limit lateral movement if systems are compromised

🔍 How to Verify

Check if Vulnerable:

Check Windows version and build number; vulnerable if Windows 10 build < 18362 or Windows Server 2019 build < 17763

Check Version:

winver or systeminfo | findstr /B /C:"OS Name" /C:"OS Version"

Verify Fix Applied:

Verify Windows build number is 18362 or higher for Windows 10, or 17763.xxx with May 2019 updates applied

📡 Detection & Monitoring

Log Indicators:

  • Event ID 4688 with suspicious process creation, especially from non-admin users creating SYSTEM processes
  • Unexpected privilege escalation events in security logs

Network Indicators:

  • Unusual outbound connections from previously low-privilege accounts
  • Lateral movement attempts from compromised systems

SIEM Query:

EventID=4688 AND NewProcessName="*" AND SubjectUserName!="SYSTEM" AND TokenElevationType="%%1938"

🔗 References

📤 Share & Export