Headline
CVE-2024-49039: Windows Task Scheduler Elevation of Privilege Vulnerability
How could an attacker exploit this vulnerability?
To exploit this vulnerability, an authenticated attacker would need to run a specially crafted application on the target system exploit the vulnerability to elevate their privileges to a Medium Integrity Level.