Msrc Windows 10 For X64-Based Systems vulnerabilities
256 known vulnerabilities affecting msrc/windows_10_for_x64-based_systems.
Total CVEs
256
CISA KEV
5
actively exploited
Public exploits
31
Exploited in wild
5
Severity breakdown
CRITICAL7HIGH123MEDIUM115LOW11
Vulnerabilities
Page 1 of 13
CVE-2025-53768HIGHCVSS 7.82025-10-14
CVE-2025-53768 [HIGH] CWE-416 Xbox IStorageService Elevation of Privilege Vulnerability
Xbox IStorageService Elevation of Privilege Vulnerability
Description: Use after free in Xbox allows an authorized attacker to elevate privileges locally.
FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability?
An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.
Xbox: Xbox
Microsoft: Microsoft
Customer Action Required: Yes
Im
msrc
CVE-2025-32707HIGHCVSS 7.82025-05-13
CVE-2025-32707 [HIGH] CWE-125 NTFS Elevation of Privilege Vulnerability
NTFS Elevation of Privilege Vulnerability
Description: Out-of-bounds read in Windows NTFS allows an unauthorized attacker to elevate privileges locally.
FAQ: According to the CVSS metric, the attack vector is local (AV:L) while user interaction is required (UI:R). What does that mean for this vulnerability?
An attacker can trick a local user on a vulnerable system into mounting a specially crafted VHD that would then trigg
msrc
CVE-2025-27483HIGHCVSS 7.82025-04-08
CVE-2025-27483 [HIGH] CWE-125 NTFS Elevation of Privilege Vulnerability
NTFS Elevation of Privilege Vulnerability
Description: Out-of-bounds read in Windows NTFS allows an unauthorized attacker to elevate privileges locally.
FAQ: Are the updates for Windows 10 for x64-based Systems and Windows 10 for 32-bit Systems currently available?
Yes. As of April 9, 2025, the security update (5055547) for Windows 10 for x64-based Systems and Windows 10 for 32-bit Systems are available. Customers running
msrc
CVE-2025-27741HIGHCVSS 7.82025-04-08
CVE-2025-27741 [HIGH] CWE-125 NTFS Elevation of Privilege Vulnerability
NTFS Elevation of Privilege Vulnerability
Description: Out-of-bounds read in Windows NTFS allows an unauthorized attacker to elevate privileges locally.
FAQ: Are the updates for Windows 10 for x64-based Systems and Windows 10 for 32-bit Systems currently available?
Yes. As of April 9, 2025, the security update (5055547) for Windows 10 for x64-based Systems and Windows 10 for 32-bit Systems are available. Customers running
msrc
CVE-2025-27733HIGHCVSS 7.82025-04-08
CVE-2025-27733 [HIGH] CWE-125 NTFS Elevation of Privilege Vulnerability
NTFS Elevation of Privilege Vulnerability
Description: Out-of-bounds read in Windows NTFS allows an unauthorized attacker to elevate privileges locally.
FAQ: Are the updates for Windows 10 for x64-based Systems and Windows 10 for 32-bit Systems currently available?
Yes. As of April 9, 2025, the security update (5055547) for Windows 10 for x64-based Systems and Windows 10 for 32-bit Systems are available. Customers running
msrc
CVE-2025-27472MEDIUMCVSS 5.42025-04-08
CVE-2025-27472 [MEDIUM] CWE-693 Windows Mark of the Web Security Feature Bypass Vulnerability
Windows Mark of the Web Security Feature Bypass Vulnerability
Description: Protection mechanism failure in Windows Mark of the Web (MOTW) allows an unauthorized attacker to bypass a security feature over a network.
FAQ: According to the CVSS metrics, successful exploitation of this vulnerability could lead to some loss of integrity (I:L) and some loss of availability (A:L). What does that mean for thi
msrc
CVE-2025-24983HIGHCVSS 7.0KEV2025-03-11
CVE-2025-24983 [HIGH] CWE-416 Windows Win32 Kernel Subsystem Elevation of Privilege Vulnerability
Windows Win32 Kernel Subsystem Elevation of Privilege Vulnerability
Description: Use after free in Windows Win32 Kernel Subsystem allows an authorized attacker to elevate privileges locally.
FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?
Successful exploitation of this vulnerability requires an attacker to win a race condition.
msrc
CVE-2024-43645MEDIUMCVSS 6.72024-11-12
CVE-2024-43645 [MEDIUM] CWE-693 Windows Defender Application Control (WDAC) Security Feature Bypass Vulnerability
Windows Defender Application Control (WDAC) Security Feature Bypass Vulnerability
FAQ: What kind of security feature could be bypassed by successfully exploiting this vulnerability?
An attacker who successfully exploits this vulnerability could bypass Windows Defender Application Control (WDAC) enforcement. This could lead to the ability to run unauthorized applications on target sy
msrc
CVE-2024-30092HIGHCVSS 8.02024-10-08
CVE-2024-30092 [HIGH] CWE-20 Windows Hyper-V Remote Code Execution Vulnerability
Windows Hyper-V Remote Code Execution Vulnerability
FAQ: Under what circumstances might this vulnerability be exploited other than as a denial of service attack against a Hyper-V host?
This issue allows a guest VM to force the Hyper-V host's kernel to read from an arbitrary, potentially invalid address. The contents of the address read would not be returned to the guest VM. In most circumstances, this would result
msrc
CVE-2024-43491CRITICALCVSS 9.8Exploited2024-09-10
CVE-2024-43491 [CRITICAL] CWE-416 Microsoft Windows Update Remote Code Execution Vulnerability
Microsoft Windows Update Remote Code Execution Vulnerability
Description: Microsoft is aware of a vulnerability in Servicing Stack that has rolled back the fixes for some vulnerabilities affecting Optional Components on Windows 10, version 1507 (initial version released July 2015). This means that an attacker could exploit these previously mitigated vulnerabilities on Windows 10, version 1507 (Windows
msrc
CVE-2024-38235MEDIUMCVSS 6.52024-09-10
CVE-2024-38235 [MEDIUM] CWE-416 Windows Hyper-V Denial of Service Vulnerability
Windows Hyper-V Denial of Service Vulnerability
FAQ: Windows 11, version 24H2 is not generally available yet. Why are there updates for this version of Windows listed in the Security Updates table?
The new Copilot+ devices that are now publicly available come with Windows 11, version 24H2 installed. Customers with these devices need to know about any vulnerabilities that affect their machine and to install the updat
msrc
CVE-2024-43487MEDIUMCVSS 6.52024-09-10
CVE-2024-43487 [MEDIUM] CWE-693 Windows Mark of the Web Security Feature Bypass Vulnerability
Windows Mark of the Web Security Feature Bypass Vulnerability
FAQ: What kind of security feature could be bypassed by successfully exploiting this vulnerability?
An attacker who successfully exploited this vulnerability could bypass the SmartScreen user experience.
FAQ: According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?
An attacker must send
msrc
CVE-2024-30017HIGHCVSS 8.82024-05-14
CVE-2024-30017 [HIGH] CWE-122 Windows Hyper-V Remote Code Execution Vulnerability
Windows Hyper-V Remote Code Execution Vulnerability
FAQ: According to the CVSS metric, privileges required is low (PR:L). What does that mean for this vulnerability?
The attacker must be authenticated to be able to exploit this vulnerability.
FAQ: How would an attacker exploit this vulnerability?
An attacker who successfully exploited this vulnerability could send malformed packets to Hyper-V Replica endpoints on
msrc
CVE-2024-26245HIGHCVSS 7.82024-04-09
CVE-2024-26245 [HIGH] CWE-125 Windows SMB Elevation of Privilege Vulnerability
Windows SMB Elevation of Privilege Vulnerability
FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability?
An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.
Windows Kernel: Windows Kernel
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Elevation of Privilege
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software
msrc
CVE-2024-29064MEDIUMCVSS 6.22024-04-09
CVE-2024-29064 [MEDIUM] CWE-130 Windows Hyper-V Denial of Service Vulnerability
Windows Hyper-V Denial of Service Vulnerability
Role: Windows Hyper-V: Role: Windows Hyper-V
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Denial of Service
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;DOS:N/A
Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5036896
Reference: https://support.microsoft.com/help/5036896
msrc
CVE-2024-21408MEDIUMCVSS 5.52024-03-12
CVE-2024-21408 [MEDIUM] CWE-835 Windows Hyper-V Denial of Service Vulnerability
Windows Hyper-V Denial of Service Vulnerability
Role: Windows Hyper-V: Role: Windows Hyper-V
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Denial of Service
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;DOS:N/A
Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5035849
Reference: https://support.microsoft.com/help/5035849
msrc
CVE-2023-35633HIGHCVSS 7.82023-12-12
CVE-2023-35633 [HIGH] CWE-59 Windows Kernel Elevation of Privilege Vulnerability
Windows Kernel Elevation of Privilege Vulnerability
FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability?
An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.
Windows Kernel: Windows Kernel
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Elevation of Privilege
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Sof
msrc
CVE-2023-35629MEDIUMCVSS 6.82023-12-12
CVE-2023-35629 [MEDIUM] CWE-125 Microsoft USBHUB 3.0 Device Driver Remote Code Execution Vulnerability
Microsoft USBHUB 3.0 Device Driver Remote Code Execution Vulnerability
Windows USB Mass Storage Class Driver: Windows USB Mass Storage Class Driver
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Remote Code Execution
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;DOS:N/A
Reference: https://catalog.update.microsoft.com/v7/sit
msrc
CVE-2023-36718HIGHCVSS 7.82023-10-10
CVE-2023-36718 [HIGH] Microsoft Virtual Trusted Platform Module Remote Code Execution Vulnerability
Microsoft Virtual Trusted Platform Module Remote Code Execution Vulnerability
FAQ: According to the CVSS Metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?
Successful exploitation of this vulnerability would rely upon complex memory shaping techniques to attempt an attack.
FAQ: According to the CVSS metric, a successful exploitation could lead to a scope ch
msrc
CVE-2023-36717MEDIUMCVSS 6.52023-10-10
CVE-2023-36717 [MEDIUM] Windows Virtual Trusted Platform Module Denial of Service Vulnerability
Windows Virtual Trusted Platform Module Denial of Service Vulnerability
FAQ: According to the CVSS metric, a successful exploitation could lead to a scope change (S:C). What does this mean for this vulnerability?
Successful exploitation of this vulnerability could allow a Hyper-V guest to affect the functionality of the Hyper-V host.
Windows TPM: Windows TPM
Microsoft: Microsoft
Customer Action Re
msrc
1 / 13Next →