CVE-2019-1171

5.6 MEDIUM

📋 TL;DR

CVE-2019-1171 is an information disclosure vulnerability in SymCrypt's OAEP decryption implementation. Attackers with local access can exploit this to obtain sensitive information that could facilitate further system compromise. This affects Windows systems using vulnerable versions of SymCrypt.

💻 Affected Systems

Products:
  • Microsoft Windows
Versions: Windows 10, Windows Server 2016, Windows Server 2019
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Affects systems using SymCrypt for cryptographic operations with OAEP padding.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker obtains cryptographic keys or other sensitive data, leading to complete system compromise through subsequent attacks.

🟠

Likely Case

Local attackers extract limited information that could assist in privilege escalation or lateral movement attacks.

🟢

If Mitigated

With proper access controls, impact is limited to information disclosure from the compromised user context.

🌐 Internet-Facing: LOW - Requires local system access, not remotely exploitable.
🏢 Internal Only: MEDIUM - Internal attackers with local access could exploit this as part of a broader attack chain.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires local access and ability to run specially crafted application. No public exploits known.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: October 2019 security updates

Vendor Advisory: https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1171

Restart Required: Yes

Instructions:

1. Apply October 2019 Windows security updates. 2. Restart affected systems. 3. Verify update installation via Windows Update history.

🧯 If You Can't Patch

  • Restrict local user access to sensitive systems.
  • Implement application whitelisting to prevent unauthorized applications.

🔍 How to Verify

Check if Vulnerable:

Check Windows Update history for October 2019 security updates. Systems without KB4517389 (Windows 10 1903) or equivalent updates are vulnerable.

Check Version:

systeminfo | findstr /B /C:"OS Name" /C:"OS Version"

Verify Fix Applied:

Verify October 2019 security updates are installed via Windows Update history or 'systeminfo' command.

📡 Detection & Monitoring

Log Indicators:

  • Unusual cryptographic operations in application logs
  • Failed or abnormal OAEP decryption attempts

Network Indicators:

  • None - local vulnerability only

SIEM Query:

Search for process creation events running unusual cryptographic tools or applications with high privilege cryptographic operations.

🔗 References

📤 Share & Export