CVE-2024-49039

ENISA EUVD: EUVD-2024-43910 ↗
Exploited in the Wild ✓ Confirmed 0-Day ★ Google Project Zero
Triaged: March 3, 2026 7 articles Published: 2024-11-12

EPSS Score

Source: FIRST.org · 2026-05-23
63.67%
probability
This CVE has a 63.67% probability of being exploited in the next 30 days.
0% Top 98.4th percentile of all CVEs 100%

CVSS v3.1

Source: VulnerabilityLookup (CIRCL)
8.8
HIGH
Attack Vector
Local
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Changed
Confidentiality
High
Integrity
High
Availability
High
Temporal
Exploit Code Maturity
Functional
Remediation Level
Official Fix
Report Confidence
Confirmed
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:F/RL:O/RC:C

Description

NVD
Windows Task Scheduler Elevation of Privilege Vulnerability

Affected Products

Microsoft
Windows Server 2025
10.0.26100.0
Microsoft
Windows Server 2025 (Server Core installation)
10.0.26100.0
Microsoft
Windows 10 Version 1809
10.0.17763.0
Microsoft
Windows Server 2019
10.0.17763.0
Microsoft
Windows Server 2019 (Server Core installation)
10.0.17763.0

Attack Intelligence

Google Project Zero

Reported by
Vlad Stolyarov and Bahare Sabouri of Google's Threat Analysis Group
Root Cause Analysis
???

Exploits & PoC

je5442804/WPTaskScheduler_CVE-2024-49039

WPTaskScheduler RPC Persistence & CVE-2024-49039 via Task Scheduler

144 2025-07-21
1 repo — triés par ⭐ Rechercher sur GitHub ↗

Signal Intelligence

Confidence
92%
EPSS 63.67%
CVSS v3.1 8.8
Mentions 7
Last Seen Nov 26, 2024

CNA Information

CNA Assigner
microsoft
CNA Title
Windows Task Scheduler Elevation of Privilege Vulnerability

Analyst Note

This CVE is confirmed as a zero-day vulnerability affecting Windows Server 2025's Task Scheduler with a HIGH severity rating (CVSS 8.8). The vulnerability was addressed in Microsoft's November 2024 Patch Tuesday and is documented by reputable sources including Google Project Zero and CERT-EU, with active exploitation reported by Russian threat actors.

Threat Actors 14

Turla Group
apt_group Information theft and espionage Russian Federation
Cobalt
apt_group Financial crime 🇷🇺 RU
APT 28
apt_group Information theft and espionage 🇷🇺 RU
Kimsuky
apt_group Information theft and espionage 🇰🇷 KR
Careto
apt_group Information theft and espionage 🇪🇸 ES
Hacking Team
apt_group 🇮🇹 IT
Gamaredon Group
apt_group Information theft and espionage 🇷🇺 RU
ELECTRUM
apt_group Information theft and espionage 🇷🇺 RU
Group 27
apt_group Information theft and espionage 🇨🇳 CN
RomCom
apt_group Financial gain 🇷🇺 RU
Rocke
apt_group 🇨🇳 CN
Void Rabisu
apt_group Financial gain 🇷🇺 RU
Red Dev 17
apt_group 🇨🇳 CN
Red October
apt_group 🇷🇺 RU

Triage Info

Decided atMar 03, 2026
Published DateNov 12, 2024