### [CVE-2019-1082](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1082) ![](https://img.shields.io/static/v1?label=Product&message=Windows%20Server&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=Windows&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Vulnerability&message=Elevation%20of%20Privilege&color=brighgreen) ### Description An elevation of privilege vulnerability exists in Microsoft Windows where a certain DLL, with Local Service privilege, is vulnerable to race planting a customized DLL.An attacker who successfully exploited this vulnerability could potentially elevate privilege to SYSTEM.The update addresses this vulnerability by requiring SYSTEM privileges for a certain DLL., aka 'Microsoft Windows Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2019-1074. ### POC #### Reference No PoCs from references. #### Github - https://github.com/CyberMonitor/somethingweneed - https://github.com/alphaSeclab/sec-daily-2019 - https://github.com/pengusec/awesome-netsec-articles