Msrc Windows 10 For X64-Based Systems vulnerabilities

256 known vulnerabilities affecting msrc/windows_10_for_x64-based_systems.

Total CVEs
256
CISA KEV
5
actively exploited
Public exploits
31
Exploited in wild
5
Severity breakdown
CRITICAL7HIGH123MEDIUM115LOW11

Vulnerabilities

Page 2 of 13
CVE-2023-29336HIGHCVSS 7.8KEVPoC2023-05-09
CVE-2023-29336 [HIGH] CWE-416 Win32k Elevation of Privilege Vulnerability Win32k Elevation of Privilege Vulnerability FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. Windows Win32K: Windows Win32K Microsoft: Microsoft Customer Action Required: Yes Impact: Elevation of Privilege Exploit Status: Publicly Disclosed:No;Exploited:Yes;Latest Software Release:
msrc
CVE-2023-28226MEDIUMCVSS 5.32023-04-11
CVE-2023-28226 [MEDIUM] CWE-347 Windows Enroll Engine Security Feature Bypass Vulnerability Windows Enroll Engine Security Feature Bypass Vulnerability FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability? The attacker must inject themselves into the logical network path between the target and the resource requested by the victim to read or modify network communications. This is called a machine-in-the-middle (MITM) attack. FAQ: Wh
msrc
CVE-2023-1017HIGHCVSS 8.82023-03-14
CVE-2023-1017 [HIGH] CWE-122 CERT/CC: CVE-2023-1017 TPM2.0 Module Library Elevation of Privilege Vulnerability CERT/CC: CVE-2023-1017 TPM2.0 Module Library Elevation of Privilege Vulnerability FAQ: How could an attacker exploit this vulnerability? By leveraging malicious TPM commands from a guest VM to a target running Hyper-V, an attacker can cause an out of bounds write in the root partition. FAQ: Why is the CERT/CC the assigning CNA (CVE Numbering Authority)? This CVE is regarding a vulnera
msrc
CVE-2023-1018HIGHCVSS 8.82023-03-14
CVE-2023-1018 [MEDIUM] CWE-122 CERT/CC: CVE-2023-1018 TPM2.0 Module Library Elevation of Privilege Vulnerability CERT/CC: CVE-2023-1018 TPM2.0 Module Library Elevation of Privilege Vulnerability FAQ: Why is the CERT/CC the assigning CNA (CVE Numbering Authority)? This CVE is regarding a vulnerability in a third party driver. CERT/CC created this CVE on behalf of the researcher who discovered the vulnerability. Windows TPM: Windows TPM CERT/CC: CERT/CC Customer Action Required: Yes Impact: E
msrc
CVE-2023-23411MEDIUMCVSS 6.52023-03-14
CVE-2023-23411 [MEDIUM] Windows Hyper-V Denial of Service Vulnerability Windows Hyper-V Denial of Service Vulnerability FAQ: According to the CVSS metric, a successful exploitation could lead to a scope change (S:C). What does this mean for this vulnerability? Successful exploitation of this vulnerability could allow a Hyper-V guest to affect the functionality of the Hyper-V host. Role: Windows Hyper-V: Role: Windows Hyper-V Microsoft: Microsoft Customer Action Required: Yes Impact: Denial
msrc
CVE-2022-44682MEDIUMCVSS 6.82022-12-13
CVE-2022-44682 [MEDIUM] Windows Hyper-V Denial of Service Vulnerability Windows Hyper-V Denial of Service Vulnerability FAQ: According to the CVSS metric, the Hyper-V attack vector is adjacent (AV:A). What does that mean for this vulnerability? Where the attack vector metric is Adjacent (A), this represents virtual machines connected via a Hyper-V Network Virtualization (HNV) logical network. This configuration forms an isolation boundary where the virtual machines within the virtual network ca
msrc
CVE-2022-38015MEDIUMCVSS 6.52022-11-08
CVE-2022-38015 [MEDIUM] Windows Hyper-V Denial of Service Vulnerability Windows Hyper-V Denial of Service Vulnerability FAQ: According to the CVSS metric, a successful exploitation could lead to a scope change (S:C). What does this mean for this vulnerability? Successful exploitation of this vulnerability could allow a Hyper-V guest to affect the functionality of the Hyper-V host. Role: Windows Hyper-V: Role: Windows Hyper-V Microsoft: Microsoft Customer Action Required: Yes Impact: Denial
msrc
CVE-2022-30144HIGHCVSS 7.52022-08-09
CVE-2022-30144 [HIGH] Windows Bluetooth Service Remote Code Execution Vulnerability Windows Bluetooth Service Remote Code Execution Vulnerability FAQ: According to the CVSS metric, the attack vector is adjacent (AV:A). What does that mean for this vulnerability? This vulnerability's attack is limited at the protocol level to a logically adjacent topology. This means it cannot simply be done across the internet, but instead needs something specific tied to the target. Good examples would include
msrc
CVE-2022-34696HIGHCVSS 7.82022-08-09
CVE-2022-34696 [HIGH] Windows Hyper-V Remote Code Execution Vulnerability Windows Hyper-V Remote Code Execution Vulnerability FAQ: According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution? The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally. The vulnerable endpoint is only available
msrc
CVE-2022-22008HIGHCVSS 7.82022-04-12
CVE-2022-22008 [HIGH] Windows Hyper-V Remote Code Execution Vulnerability Windows Hyper-V Remote Code Execution Vulnerability FAQ: According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution? The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally. For example, when the score indicates tha
msrc
CVE-2022-21967HIGHCVSS 7.02022-03-08
CVE-2022-21967 [HIGH] Xbox Live Auth Manager for Windows Elevation of Privilege Vulnerability Xbox Live Auth Manager for Windows Elevation of Privilege Vulnerability FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability? Successful exploitation of this vulnerability requires an attacker to take additional actions prior to exploitation to prepare the target environment. FAQ: The security updates for this vulnerability are all Windows
msrc
CVE-2022-21975MEDIUMCVSS 4.72022-03-08
CVE-2022-21975 [MEDIUM] Windows Hyper-V Denial of Service Vulnerability Windows Hyper-V Denial of Service Vulnerability FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability? Successful exploitation of this vulnerability requires an attacker to win a race condition. Role: Windows Hyper-V: Role: Windows Hyper-V Microsoft: Microsoft Customer Action Required: Yes Impact: Denial of Service Exploit Status: Publicly Disclosed:No;Explo
msrc
CVE-2022-21995HIGHCVSS 7.92022-02-08
CVE-2022-21995 [HIGH] Windows Hyper-V Remote Code Execution Vulnerability Windows Hyper-V Remote Code Execution Vulnerability FAQ: According to the CVSS metric, a successful exploitation could lead to a scope change (S:C). What does this mean for this vulnerability? In this case, a successful attack could be performed from a low privilege Hyper-V guest. The attacker could traverse the guest's security boundary to execute code on the Hyper-V host execution environment. FAQ: According to the CVS
msrc
CVE-2022-21901CRITICALCVSS 9.02022-01-11
CVE-2022-21901 [CRITICAL] Windows Hyper-V Elevation of Privilege Vulnerability Windows Hyper-V Elevation of Privilege Vulnerability FAQ: How could an attacker exploit this vulnerability? An authenticated attacker could run a specially crafted application on a vulnerable Hyper-V guest to exploit this vulnerability which, if successful, could potentially interact with processes of another Hyper-V guest hosted on the same Hyper-V host. Role: Windows Hyper-V: Role: Windows Hyper-V Microsoft: Micr
msrc
CVE-2022-21899MEDIUMCVSS 5.52022-01-11
CVE-2022-21899 [MEDIUM] Windows Extensible Firmware Interface Security Feature Bypass Vulnerability Windows Extensible Firmware Interface Security Feature Bypass Vulnerability Windows UEFI: Windows UEFI Microsoft: Microsoft Customer Action Required: Yes Impact: Security Feature Bypass Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely Reference: https://catalog.update.microsoft.com/v7/site/Sear
msrc
CVE-2021-42284MEDIUMCVSS 6.82021-11-09
CVE-2021-42284 [MEDIUM] Windows Hyper-V Denial of Service Vulnerability Windows Hyper-V Denial of Service Vulnerability FAQ: What are the vulnerable configurations of Hyper-V? Any installation of Hyper-V that exposes one or more virtual switches to guests would be vulnerable. Role: Windows Hyper-V: Role: Windows Hyper-V Microsoft: Microsoft Customer Action Required: Yes Impact: Denial of Service Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Li
msrc
CVE-2021-36938MEDIUMCVSS 5.52021-08-10
CVE-2021-36938 [MEDIUM] Windows Cryptographic Primitives Library Information Disclosure Vulnerability Windows Cryptographic Primitives Library Information Disclosure Vulnerability Windows Cryptographic Services: Windows Cryptographic Services Microsoft: Microsoft Impact: Information Disclosure Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Unlikely;Older Software Release:Exploitation Unlikely;DOS:N/A Reference: https://catalog.update.microsoft.com/v7
msrc
CVE-2021-33740HIGHCVSS 7.82021-07-13
CVE-2021-33740 [HIGH] Windows Media Remote Code Execution Vulnerability Windows Media Remote Code Execution Vulnerability Microsoft Windows Codecs Library: Microsoft Windows Codecs Library Microsoft: Microsoft Impact: Remote Code Execution Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5004244 Reference: https:/
msrc
CVE-2021-34439HIGHCVSS 7.82021-07-13
CVE-2021-34439 [HIGH] Microsoft Windows Media Foundation Remote Code Execution Vulnerability Microsoft Windows Media Foundation Remote Code Execution Vulnerability Microsoft Windows Media Foundation: Microsoft Windows Media Foundation Microsoft: Microsoft Impact: Remote Code Execution Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A Reference: https://catalog.update.microsoft.com/v7/si
msrc
CVE-2021-31977HIGHCVSS 8.62021-06-08
CVE-2021-31977 [HIGH] Windows Hyper-V Denial of Service Vulnerability Windows Hyper-V Denial of Service Vulnerability FAQ: How might an attacker attempt to exploit this vulnerability? By sending a specially crafted message to the Hyper-V host virtualization stack, a guest VM could cause a reference count in the host virtualization stack to be leaked. In most circumstances, this would result in a memory leak on the Hyper-V host. If the leaked reference count value were to overflow, reference cou
msrc