Windows 10 Task Scheduler Zero-Day Vulnerability Exploit Leaked, Can Help Gain Admin-Level Access

The flaw is open for exploitation and remains unpatched.

Advertisement
By Nadeem Sarwar | Updated: 22 May 2019 14:28 IST
Highlights
  • The exploit can be tweaked to work on older versions of Windows
  • A proof-of-concept video has also been made public
  • Microsoft is yet to acknowledge the LPE vulnerability and fix it

The same researcher unearthed a zero-day vulnerability last year as well.

Windows 10 has been hit by yet another zero-day vulnerability that can allow malicious parties to gain admin-level privileges. The yet unnamed zero-day vulnerability can be exploited to break into a system and gain full control over it. The newly discovered threat to Microsoft's operating system can be classified as a Local Privilege Escalation (LPE) that can help hackers change the privilege level of an account to admin level, and it is associated with the native Task Scheduler process. The exploit can reportedly work on previous versions like Windows XP and Windows Server as well.

The vulnerability was spotted by a security researcher going by the name SandboxEscaper, the same person who also discovered another zero-day vulnerability affecting the Microsoft Data Sharing service last year. SandboxEscaper shared the demo exploit code for the vulnerability on Github, which is a little ironic since Github is owned by Microsoft, alongside a proof-of-concept video detailing the process of exploiting the flaw.

Advertisement

As mentioned above, the vulnerability is associated with the Windows Task Scheduler process wherein bad actors can run a malicious command to promote the account level from low-privilege to admin control level. Once admin access is achieved, the malicious party can gain control over the entire system and target other system files. Will Dormann, a vulnerability analyst at CERT, has confirmed that the exploit is functional even on the latest Windows 10 May 2019 build. The exploit affects 32-bit and 64-bit versions of Windows 10, Windows Server 2016 and Windows Server 2019.

Theoretically, the flaw can reportedly be exploited on all versions of Windows such as Windows XP, and dating all the way back to Windows Server 2003. The vulnerability is yet to be patched, which means it is open to exploit. SandboxEscaper also claims to have discovered four more unpatched Windows bugs, with three of them being LPEs and the last one being associated with the Sandbox process.

 

Get your daily dose of tech news, reviews, and insights, in under 80 characters on Gadgets 360 Turbo. Connect with fellow tech lovers on our Forum. Follow us on X, Facebook, WhatsApp, Threads and Google News for instant updates. Catch all the action on our YouTube channel.

Advertisement

Related Stories

Popular Mobile Brands
  1. OnePlus Nord CE 6 Visits Geekbench With These Specifications
  2. Apple WWDC 2026 Artwork Teases New Siri Interface, AI Features in iOS 27
  3. BAFTA Games Awards 2026 Winners Announced: See Full List
  1. Xiaomi 18 Pro Max Specifications Leak; Might Feature Snapdragon 8 Elite Gen 6 Pro Chip, 6.9-Inch Display
  2. OnePlus Ace 6 Ultra Launch Date Announced; New OnePlus-Branded Gaming Controller Will Tag Along
  3. Huawei Pura 90, Pura 90 Pro and Pura 90 Pro Max Key Specifications Leaked Ahead of China Launch
  4. Google Reportedly Exploring AI Inference Chip Partnership With Marvell Technology
  5. Clair Obscur: Expedition 33 Crowned Best Game at BAFTA Games Awards 2026: Full List of Winners
  6. Oppo Find X9s Key Specifications, Performance Details Spotted on Geekbench Ahead of Launch
  7. Realme C81 Said to Launch in India Soon; Key Specifications, Colours, Storage Leaked
  8. OnePlus Nord CE 6 Listed on Geekbench With Snapdragon 7s Gen 4 Chip, 8GB RAM
  9. Apple’s WWDC 2026 Teaser Hints at Siri Overhaul With New UI, AI Features: Report
  10. NASA Observes Rare Sungrazer Comet Disintegration Near the Sun
Download Our Apps
Available in Hindi
© Copyright Red Pixels Ventures Limited 2026. All rights reserved.