cognitive cybersecurity intelligence

News and Analysis

Search

New Windows Task Scheduler Vulnerabilities Allows Command Execution as Admin User

New Windows Task Scheduler Vulnerabilities Allows Command Execution as Admin User

Cymulate researchers have uncovered critical vulnerabilities in Windows Task Scheduler (schtasks.exe) that allow attackers to gain SYSTEM-level privileges, bypass UAC prompts, and manipulate or erase audit logs. This enables privilege escalation and stealthy actions, significantly increasing risks within Windows environments, including potential data exfiltration and evasion of detection, even for low-privileged users.

Source: cybersecuritynews.com –

Subscribe to newsletter

Subscribe to HEAL Security Dispatch for the latest healthcare cybersecurity news and analysis.

More Posts