CVE-2024-49039
ENISA EUVD: EUVD-2024-43910 ↗
Exploited in the Wild
✓ Confirmed 0-Day
★ Google Project Zero
Triaged: March 3, 2026
7 articles
Published: 2024-11-12
EPSS Score
Source: FIRST.org · 2026-05-23
63.67%
probability
This CVE has a 63.67% probability
of being exploited in the next 30 days.
0%
Top 98.4th percentile of all CVEs
100%
CVSS v3.1
Source: VulnerabilityLookup (CIRCL)8.8
HIGH
Attack Vector
Local
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Changed
Confidentiality
High
Integrity
High
Availability
High
Temporal
Exploit Code Maturity
Functional
Remediation Level
Official Fix
Report Confidence
Confirmed
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:F/RL:O/RC:C
Description
NVDWindows Task Scheduler Elevation of Privilege Vulnerability
Affected Products
Microsoft
Windows Server 2025
10.0.26100.0
Microsoft
Windows Server 2025 (Server Core installation)
10.0.26100.0
Microsoft
Windows 10 Version 1809
10.0.17763.0
Microsoft
Windows Server 2019
10.0.17763.0
Microsoft
Windows Server 2019 (Server Core installation)
10.0.17763.0
Google Project Zero
Reported by
Vlad Stolyarov and Bahare Sabouri of Google's Threat Analysis Group
Root Cause Analysis
???
Exploits & PoC
je5442804/WPTaskScheduler_CVE-2024-49039
WPTaskScheduler RPC Persistence & CVE-2024-49039 via Task Scheduler
144
2025-07-21
1 repo — triés par ⭐
Rechercher sur GitHub ↗
Signal Intelligence
Confidence
92%
EPSS
63.67%
CVSS v3.1
8.8
Mentions
7
Last Seen
Nov 26, 2024
CNA Information
CNA Assigner
microsoft
CNA Title
Windows Task Scheduler Elevation of Privilege Vulnerability
Analyst Note
This CVE is confirmed as a zero-day vulnerability affecting Windows Server 2025's Task Scheduler with a HIGH severity rating (CVSS 8.8). The vulnerability was addressed in Microsoft's November 2024 Patch Tuesday and is documented by reputable sources including Google Project Zero and CERT-EU, with active exploitation reported by Russian threat actors.
Threat Actors 14
Turla Group
apt_group
Information theft and espionage
Russian Federation
Cobalt
apt_group
Financial crime
🇷🇺 RU
APT 28
apt_group
Information theft and espionage
🇷🇺 RU
Kimsuky
apt_group
Information theft and espionage
🇰🇷 KR
Careto
apt_group
Information theft and espionage
🇪🇸 ES
Hacking Team
apt_group
🇮🇹 IT
Gamaredon Group
apt_group
Information theft and espionage
🇷🇺 RU
ELECTRUM
apt_group
Information theft and espionage
🇷🇺 RU
Group 27
apt_group
Information theft and espionage
🇨🇳 CN
RomCom
apt_group
Financial gain
🇷🇺 RU
Rocke
apt_group
🇨🇳 CN
Void Rabisu
apt_group
Financial gain
🇷🇺 RU
Red Dev 17
apt_group
🇨🇳 CN
Red October
apt_group
🇷🇺 RU
Triage Info
Decided atMar 03, 2026
Published DateNov 12, 2024