Msrc Windows 10 Version 1809 For Arm64-Based Systems vulnerabilities

372 known vulnerabilities affecting msrc/windows_10_version_1809_for_arm64-based_systems.

Total CVEs
372
CISA KEV
17
actively exploited
Public exploits
23
Exploited in wild
22
Severity breakdown
CRITICAL7HIGH252MEDIUM111LOW2

Vulnerabilities

Page 1 of 19
CVE-2024-35265HIGHCVSS 7.02024-06-11
CVE-2024-35265 [HIGH] CWE-367 Windows Perception Service Elevation of Privilege Vulnerability Windows Perception Service Elevation of Privilege Vulnerability FAQ: What privileges could be gained by an attacker who successfully exploited the vulnerability? An attacker who successfully exploited this vulnerability could create or delete files in the security context of the “NT AUTHORITY\ LOCAL SERVICE” account. FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does th
msrc
CVE-2024-30089HIGHCVSS 7.82024-06-11
CVE-2024-30089 [HIGH] CWE-416 Microsoft Streaming Service Elevation of Privilege Vulnerability Microsoft Streaming Service Elevation of Privilege Vulnerability FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. Microsoft Streaming Service: Microsoft Streaming Service Microsoft: Microsoft Customer Action Required: Yes Impact: Elevation of Privilege Exploit
msrc
CVE-2024-30085HIGHCVSS 7.8PoC2024-06-11
CVE-2024-30085 [HIGH] CWE-122 Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. Windows Cloud Files Mini Filter Driver: Windows Cloud Files Mini Filter Driver Microsoft: Microsoft Customer Action Required: Y
msrc
CVE-2024-30096MEDIUMCVSS 5.52024-06-11
CVE-2024-30096 [MEDIUM] CWE-200 Windows Cryptographic Services Information Disclosure Vulnerability Windows Cryptographic Services Information Disclosure Vulnerability FAQ: What type of information could be disclosed by this vulnerability? The type of information that could be disclosed if an attacker successfully exploited this vulnerability is Windows cryptographic secrets. FAQ: What type of information could be disclosed by this vulnerability? An attacker who successfully exploited this vul
msrc
CVE-2024-30035HIGHCVSS 7.82024-05-14
CVE-2024-30035 [HIGH] CWE-416 Windows DWM Core Library Elevation of Privilege Vulnerability Windows DWM Core Library Elevation of Privilege Vulnerability FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. Windows DWM Core Library: Windows DWM Core Library Microsoft: Microsoft Customer Action Required: Yes Impact: Elevation of Privilege Exploit Status: Publ
msrc
CVE-2024-29994HIGHCVSS 7.82024-05-14
CVE-2024-29994 [HIGH] CWE-125 Microsoft Windows SCSI Class System File Elevation of Privilege Vulnerability Microsoft Windows SCSI Class System File Elevation of Privilege Vulnerability FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability? Successf
msrc
CVE-2024-30018HIGHCVSS 7.82024-05-14
CVE-2024-30018 [HIGH] CWE-59 Windows Kernel Elevation of Privilege Vulnerability Windows Kernel Elevation of Privilege Vulnerability FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. Windows Kernel: Windows Kernel Microsoft: Microsoft Customer Action Required: Yes Impact: Elevation of Privilege Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Sof
msrc
CVE-2024-29998MEDIUMCVSS 6.82024-05-14
CVE-2024-29998 [MEDIUM] CWE-20 Windows Mobile Broadband Driver Remote Code Execution Vulnerability Windows Mobile Broadband Driver Remote Code Execution Vulnerability FAQ: According to the CVSS metric, the attack vector is physical (AV:P). What does that mean for this vulnerability? To exploit this vulnerability, an unauthenticated attacker needs to physically connect a malicious USB device to the victim's machine. Windows Mobile Broadband: Windows Mobile Broadband Microsoft: Microsoft Custo
msrc
CVE-2024-29997MEDIUMCVSS 6.82024-05-14
CVE-2024-29997 [MEDIUM] CWE-190 Windows Mobile Broadband Driver Remote Code Execution Vulnerability Windows Mobile Broadband Driver Remote Code Execution Vulnerability FAQ: According to the CVSS metric, the attack vector is physical (AV:P). What does that mean for this vulnerability? To exploit this vulnerability, an unauthenticated attacker needs to physically connect a malicious USB device to the victim's machine. Windows Mobile Broadband: Windows Mobile Broadband Microsoft: Microsoft Cust
msrc
CVE-2024-30001MEDIUMCVSS 6.82024-05-14
CVE-2024-30001 [MEDIUM] CWE-190 Windows Mobile Broadband Driver Remote Code Execution Vulnerability Windows Mobile Broadband Driver Remote Code Execution Vulnerability FAQ: According to the CVSS metric, the attack vector is physical (AV:P). What does that mean for this vulnerability? To exploit this vulnerability, an unauthenticated attacker needs to physically connect a malicious USB device to the victim's machine. Windows Mobile Broadband: Windows Mobile Broadband Microsoft: Microsoft Cust
msrc
CVE-2024-30000MEDIUMCVSS 6.82024-05-14
CVE-2024-30000 [MEDIUM] CWE-190 Windows Mobile Broadband Driver Remote Code Execution Vulnerability Windows Mobile Broadband Driver Remote Code Execution Vulnerability FAQ: According to the CVSS metric, the attack vector is physical (AV:P). What does that mean for this vulnerability? To exploit this vulnerability, an unauthenticated attacker needs to physically connect a malicious USB device to the victim's machine. Windows Mobile Broadband: Windows Mobile Broadband Microsoft: Microsoft Cust
msrc
CVE-2024-30002MEDIUMCVSS 6.82024-05-14
CVE-2024-30002 [MEDIUM] CWE-20 Windows Mobile Broadband Driver Remote Code Execution Vulnerability Windows Mobile Broadband Driver Remote Code Execution Vulnerability FAQ: According to the CVSS metric, the attack vector is physical (AV:P). What does that mean for this vulnerability? To exploit this vulnerability, an unauthenticated attacker needs to physically connect a malicious USB device to the victim's machine. Windows Mobile Broadband: Windows Mobile Broadband Microsoft: Microsoft Custo
msrc
CVE-2024-30003MEDIUMCVSS 6.82024-05-14
CVE-2024-30003 [MEDIUM] CWE-190 Windows Mobile Broadband Driver Remote Code Execution Vulnerability Windows Mobile Broadband Driver Remote Code Execution Vulnerability FAQ: According to the CVSS metric, the attack vector is physical (AV:P). What does that mean for this vulnerability? To exploit this vulnerability, an unauthenticated attacker needs to physically connect a malicious USB device to the victim's machine. Windows Mobile Broadband: Windows Mobile Broadband Microsoft: Microsoft Cust
msrc
CVE-2024-30021MEDIUMCVSS 6.82024-05-14
CVE-2024-30021 [MEDIUM] CWE-190 Windows Mobile Broadband Driver Remote Code Execution Vulnerability Windows Mobile Broadband Driver Remote Code Execution Vulnerability FAQ: According to the CVSS metric, the attack vector is physical (AV:P). What does that mean for this vulnerability? To exploit this vulnerability, an unauthenticated attacker needs to physically connect a malicious USB device to the victim's machine. Windows Mobile Broadband: Windows Mobile Broadband Microsoft: Microsoft Cust
msrc
CVE-2024-29999MEDIUMCVSS 6.82024-05-14
CVE-2024-29999 [MEDIUM] CWE-190 Windows Mobile Broadband Driver Remote Code Execution Vulnerability Windows Mobile Broadband Driver Remote Code Execution Vulnerability FAQ: According to the CVSS metric, the attack vector is physical (AV:P). What does that mean for this vulnerability? To exploit this vulnerability, an unauthenticated attacker needs to physically connect a malicious USB device to the victim's machine. Windows Mobile Broadband: Windows Mobile Broadband Microsoft: Microsoft Cust
msrc
CVE-2024-30034MEDIUMCVSS 5.52024-05-14
CVE-2024-30034 [MEDIUM] CWE-843 Windows Cloud Files Mini Filter Driver Information Disclosure Vulnerability Windows Cloud Files Mini Filter Driver Information Disclosure Vulnerability FAQ: What type of information could be disclosed by this vulnerability? Exploiting this vulnerability could allow the disclosure of certain kernel memory content. Windows Cloud Files Mini Filter Driver: Windows Cloud Files Mini Filter Driver Microsoft: Microsoft Customer Action Required: Yes Impact: Informatio
msrc
CVE-2024-30004MEDIUMCVSS 6.82024-05-14
CVE-2024-30004 [MEDIUM] CWE-190 Windows Mobile Broadband Driver Remote Code Execution Vulnerability Windows Mobile Broadband Driver Remote Code Execution Vulnerability FAQ: According to the CVSS metric, the attack vector is physical (AV:P). What does that mean for this vulnerability? To exploit this vulnerability, an unauthenticated attacker needs to physically connect a malicious USB device to the victim's machine. Windows Mobile Broadband: Windows Mobile Broadband Microsoft: Microsoft Cust
msrc
CVE-2024-30012MEDIUMCVSS 6.82024-05-14
CVE-2024-30012 [MEDIUM] CWE-190 Windows Mobile Broadband Driver Remote Code Execution Vulnerability Windows Mobile Broadband Driver Remote Code Execution Vulnerability FAQ: According to the CVSS metric, the attack vector is physical (AV:P). What does that mean for this vulnerability? To exploit this vulnerability, an unauthenticated attacker needs to physically connect a malicious USB device to the victim's machine. Windows Mobile Broadband: Windows Mobile Broadband Microsoft: Microsoft Cust
msrc
CVE-2024-30005MEDIUMCVSS 6.82024-05-14
CVE-2024-30005 [MEDIUM] CWE-190 Windows Mobile Broadband Driver Remote Code Execution Vulnerability Windows Mobile Broadband Driver Remote Code Execution Vulnerability FAQ: According to the CVSS metric, the attack vector is physical (AV:P). What does that mean for this vulnerability? To exploit this vulnerability, an unauthenticated attacker needs to physically connect a malicious USB device to the victim's machine. Windows Mobile Broadband: Windows Mobile Broadband Microsoft: Microsoft Cust
msrc
CVE-2024-26237HIGHCVSS 7.82024-04-09
CVE-2024-26237 [HIGH] CWE-416 Windows Defender Credential Guard Elevation of Privilege Vulnerability Windows Defender Credential Guard Elevation of Privilege Vulnerability FAQ: What privileges could be gained by an attacker who successfully exploited the vulnerability? A domain user could use this vulnerability to elevate privileges to SYSTEM assigned integrity level. Windows Defender Credential Guard: Windows Defender Credential Guard Microsoft: Microsoft Customer Action Required: Yes Impa
msrc
1 / 19Next →