but it is not yet patchedVulnerability-related.PatchVulnerability. Darren Allan in TechRadar was one of the tech watchers reportingVulnerability-related.DiscoverVulnerabilityon the vulnerability , which could occur through a privilege escalation bug . `` The user linked to a page on GitHub which appears to contain a proof-of-concept ( PoC ) for the vulnerability , '' said Charlie Osborne in ZDNet . `` CERT/CC ( the US cybersecurity organization which looks to counter emerging threats ) has confirmedVulnerability-related.DiscoverVulnerabilitythat this vulnerability can be leveraged against a 64-bit Windows 10 PC which has been fully patchedVulnerability-related.PatchVulnerabilityup to date , `` said TechRadar , in turn referring to a story in The Register , Richard Chergwin , The Register , had reportedVulnerability-related.DiscoverVulnerabilitythat `` CERT/CC vulnerability analyst Will Dormann quickly verifiedVulnerability-related.DiscoverVulnerabilitythe bug . '' CERT/CC did a formal investigation , and posted an advisory . `` 'Microsoft Windows task scheduler containsVulnerability-related.DiscoverVulnerabilitya vulnerability in the handling of ALPC , which can allow a local user to gain SYSTEM privileges , ' the alert stated . '' This can be leveraged to gain SYSTEM privileges . We have confirmedVulnerability-related.DiscoverVulnerabilitythat the public exploit code works on 64-bit Windows 10 and Windows Server 2016 systems . We have also confirmedVulnerability-related.DiscoverVulnerabilitycompatibility with 32-bit Windows 10 with minor modifications to the public exploit code . Compatibility with other Windows versions is possible with further modifications . '' Should we worry ? Allan said it is a local bug . The attacker would have to be already logged into the PC to exploit it , or be running code on the machine . But wait . Though local , Ars Technica 's Peter Bright let its readers know what the flaw allows one to do . Not pretty . Bright wrote that `` The flaw allows anyone with the ability to run code on a system to elevate their privileges to 'SYSTEM ' level , the level used by most parts of the operating system and the nearest thing that Windows has to an all-powerful superuser . '' Osborne in ZDNet said that while the impact was limited , `` the public disclosure of a zero-day is still likely a headache for the Redmond giant . ''