An elevation of privilege vulnerability exists when Windows improperly handles calls to Advanced Local Procedure Call (ALPC).
An attacker who successfully exploited this vulnerability could run arbitrary code in the security context of the local system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.
To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that could exploit the vulnerability and take control over an affected system.
The update addresses the vulnerability by correcting how Windows handles calls to ALPC.
Metrics
Affected Vendors & Products
References
History
Fri, 20 Feb 2026 18:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Microsoft windows 10 1507
Microsoft windows 10 1607 Microsoft windows 10 1809 Microsoft windows Server 1803 Microsoft windows Server 1903 Microsoft windows Server 2008 R2 Microsoft windows Server 2012 R2 |
|
| CPEs | cpe:2.3:o:microsoft:windows_10:*:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:* cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:* cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:arm64:* cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:* cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:* cpe:2.3:o:microsoft:windows_7:*:sp1:*:*:*:*:x64:* cpe:2.3:o:microsoft:windows_7:*:sp1:*:*:*:*:x86:* cpe:2.3:o:microsoft:windows_8.1:*:*:*:*:*:*:x86:* cpe:2.3:o:microsoft:windows_server_1803:*:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_server_1903:*:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_server_2008_R2:*:*:*:*:*:*:itanium:* cpe:2.3:o:microsoft:windows_server_2008_R2:*:*:*:*:*:*:x64:* cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:x64:* cpe:2.3:o:microsoft:windows_server_2012_R2:*:*:*:*:*:*:x64:* cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:* |
|
| Vendors & Products |
Microsoft windows 10 1507
Microsoft windows 10 1607 Microsoft windows 10 1809 Microsoft windows Server 1803 Microsoft windows Server 1903 Microsoft windows Server 2008 R2 Microsoft windows Server 2012 R2 |
Tue, 20 May 2025 18:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | An elevation of privilege vulnerability exists when Windows improperly handles calls to Advanced Local Procedure Call (ALPC).An attacker who successfully exploited this vulnerability could run arbitrary code in the security context of the local system, aka 'Windows ALPC Elevation of Privilege Vulnerability'. | An elevation of privilege vulnerability exists when Windows improperly handles calls to Advanced Local Procedure Call (ALPC). An attacker who successfully exploited this vulnerability could run arbitrary code in the security context of the local system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that could exploit the vulnerability and take control over an affected system. The update addresses the vulnerability by correcting how Windows handles calls to ALPC. |
| Title | Windows ALPC Elevation of Privilege Vulnerability | |
| References |
|
Status: PUBLISHED
Assigner: microsoft
Published:
Updated: 2025-05-20T17:49:33.336Z
Reserved: 2018-11-26T00:00:00.000Z
Link: CVE-2019-0943
No data.
Status : Modified
Published: 2019-06-12T14:29:01.713
Modified: 2025-05-20T18:15:30.733
Link: CVE-2019-0943
No data.