Information about 0-day vulnerability was first disclosed in Twitter by independent security researcher. The CERT / CC specialist confirmed that Windows Task Scheduler contains a local privilege escalation vulnerability in the ALPC interface. Public exploit code works on 64-bit Windows 10 and Windows Server 2016 systems, and with minor modifications with 32-bit Windows 10. Security consultancy Acros Security released unofficial patch for the 64-bit version of Windows 10 on its 0patch platform.