U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

Vulnerability Change Records for CVE-2019-0948

Change History

CVE Modified by Microsoft Corporation 5/20/2025 2:15:30 PM

Action Type Old Value New Value
Changed Description
An information disclosure vulnerability exists in the Windows Event Viewer (eventvwr.msc) when it improperly parses XML input containing a reference to an external entity, aka 'Windows Event Viewer Information Disclosure Vulnerability'.
An information disclosure vulnerability exists in the Windows Event Viewer (eventvwr.msc) when it improperly parses XML input containing a reference to an external entity. An attacker who successfully exploited this vulnerability could read arbitrary files via an XML external entity (XXE) declaration.
To exploit the vulnerability, an attacker could create a file containing specially crafted XML content and convince an authenticated user to import the file.
The update addresses the vulnerability by modifying the way that the Event Viewer parses XML input.
Added CVSS V3.1

								
							
							
						
AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N
Added Reference

								
							
							
						
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2019-0948
Removed Reference
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0948

								
						
Removed Reference
https://www.zerodayinitiative.com/advisories/ZDI-19-641/

								
						
Removed Reference Type
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0948 Types: Patch, Vendor Advisory