Msrc Windows 10 Version 1809 For Arm64-Based Systems vulnerabilities
372 known vulnerabilities affecting msrc/windows_10_version_1809_for_arm64-based_systems.
Total CVEs
372
CISA KEV
17
actively exploited
Public exploits
23
Exploited in wild
22
Severity breakdown
CRITICAL7HIGH252MEDIUM111LOW2
Vulnerabilities
Page 1 of 19
CVE-2024-35265HIGHCVSS 7.02024-06-11
CVE-2024-35265 [HIGH] CWE-367 Windows Perception Service Elevation of Privilege Vulnerability
Windows Perception Service Elevation of Privilege Vulnerability
FAQ: What privileges could be gained by an attacker who successfully exploited the vulnerability?
An attacker who successfully exploited this vulnerability could create or delete files in the security context of the “NT AUTHORITY\ LOCAL SERVICE” account.
FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does th
msrc
CVE-2024-30089HIGHCVSS 7.82024-06-11
CVE-2024-30089 [HIGH] CWE-416 Microsoft Streaming Service Elevation of Privilege Vulnerability
Microsoft Streaming Service Elevation of Privilege Vulnerability
FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability?
An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.
Microsoft Streaming Service: Microsoft Streaming Service
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Elevation of Privilege
Exploit
msrc
CVE-2024-30085HIGHCVSS 7.8PoC2024-06-11
CVE-2024-30085 [HIGH] CWE-122 Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability
Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability
FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability?
An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.
Windows Cloud Files Mini Filter Driver: Windows Cloud Files Mini Filter Driver
Microsoft: Microsoft
Customer Action Required: Y
msrc
CVE-2024-30096MEDIUMCVSS 5.52024-06-11
CVE-2024-30096 [MEDIUM] CWE-200 Windows Cryptographic Services Information Disclosure Vulnerability
Windows Cryptographic Services Information Disclosure Vulnerability
FAQ: What type of information could be disclosed by this vulnerability?
The type of information that could be disclosed if an attacker successfully exploited this vulnerability is Windows cryptographic secrets.
FAQ: What type of information could be disclosed by this vulnerability?
An attacker who successfully exploited this vul
msrc
CVE-2024-30035HIGHCVSS 7.82024-05-14
CVE-2024-30035 [HIGH] CWE-416 Windows DWM Core Library Elevation of Privilege Vulnerability
Windows DWM Core Library Elevation of Privilege Vulnerability
FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability?
An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.
Windows DWM Core Library: Windows DWM Core Library
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Elevation of Privilege
Exploit Status: Publ
msrc
CVE-2024-29994HIGHCVSS 7.82024-05-14
CVE-2024-29994 [HIGH] CWE-125 Microsoft Windows SCSI Class System File Elevation of Privilege Vulnerability
Microsoft Windows SCSI Class System File Elevation of Privilege Vulnerability
FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability?
An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.
FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?
Successf
msrc
CVE-2024-30018HIGHCVSS 7.82024-05-14
CVE-2024-30018 [HIGH] CWE-59 Windows Kernel Elevation of Privilege Vulnerability
Windows Kernel Elevation of Privilege Vulnerability
FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability?
An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.
Windows Kernel: Windows Kernel
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Elevation of Privilege
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Sof
msrc
CVE-2024-29998MEDIUMCVSS 6.82024-05-14
CVE-2024-29998 [MEDIUM] CWE-20 Windows Mobile Broadband Driver Remote Code Execution Vulnerability
Windows Mobile Broadband Driver Remote Code Execution Vulnerability
FAQ: According to the CVSS metric, the attack vector is physical (AV:P). What does that mean for this vulnerability?
To exploit this vulnerability, an unauthenticated attacker needs to physically connect a malicious USB device to the victim's machine.
Windows Mobile Broadband: Windows Mobile Broadband
Microsoft: Microsoft
Custo
msrc
CVE-2024-29997MEDIUMCVSS 6.82024-05-14
CVE-2024-29997 [MEDIUM] CWE-190 Windows Mobile Broadband Driver Remote Code Execution Vulnerability
Windows Mobile Broadband Driver Remote Code Execution Vulnerability
FAQ: According to the CVSS metric, the attack vector is physical (AV:P). What does that mean for this vulnerability?
To exploit this vulnerability, an unauthenticated attacker needs to physically connect a malicious USB device to the victim's machine.
Windows Mobile Broadband: Windows Mobile Broadband
Microsoft: Microsoft
Cust
msrc
CVE-2024-30001MEDIUMCVSS 6.82024-05-14
CVE-2024-30001 [MEDIUM] CWE-190 Windows Mobile Broadband Driver Remote Code Execution Vulnerability
Windows Mobile Broadband Driver Remote Code Execution Vulnerability
FAQ: According to the CVSS metric, the attack vector is physical (AV:P). What does that mean for this vulnerability?
To exploit this vulnerability, an unauthenticated attacker needs to physically connect a malicious USB device to the victim's machine.
Windows Mobile Broadband: Windows Mobile Broadband
Microsoft: Microsoft
Cust
msrc
CVE-2024-30000MEDIUMCVSS 6.82024-05-14
CVE-2024-30000 [MEDIUM] CWE-190 Windows Mobile Broadband Driver Remote Code Execution Vulnerability
Windows Mobile Broadband Driver Remote Code Execution Vulnerability
FAQ: According to the CVSS metric, the attack vector is physical (AV:P). What does that mean for this vulnerability?
To exploit this vulnerability, an unauthenticated attacker needs to physically connect a malicious USB device to the victim's machine.
Windows Mobile Broadband: Windows Mobile Broadband
Microsoft: Microsoft
Cust
msrc
CVE-2024-30002MEDIUMCVSS 6.82024-05-14
CVE-2024-30002 [MEDIUM] CWE-20 Windows Mobile Broadband Driver Remote Code Execution Vulnerability
Windows Mobile Broadband Driver Remote Code Execution Vulnerability
FAQ: According to the CVSS metric, the attack vector is physical (AV:P). What does that mean for this vulnerability?
To exploit this vulnerability, an unauthenticated attacker needs to physically connect a malicious USB device to the victim's machine.
Windows Mobile Broadband: Windows Mobile Broadband
Microsoft: Microsoft
Custo
msrc
CVE-2024-30003MEDIUMCVSS 6.82024-05-14
CVE-2024-30003 [MEDIUM] CWE-190 Windows Mobile Broadband Driver Remote Code Execution Vulnerability
Windows Mobile Broadband Driver Remote Code Execution Vulnerability
FAQ: According to the CVSS metric, the attack vector is physical (AV:P). What does that mean for this vulnerability?
To exploit this vulnerability, an unauthenticated attacker needs to physically connect a malicious USB device to the victim's machine.
Windows Mobile Broadband: Windows Mobile Broadband
Microsoft: Microsoft
Cust
msrc
CVE-2024-30021MEDIUMCVSS 6.82024-05-14
CVE-2024-30021 [MEDIUM] CWE-190 Windows Mobile Broadband Driver Remote Code Execution Vulnerability
Windows Mobile Broadband Driver Remote Code Execution Vulnerability
FAQ: According to the CVSS metric, the attack vector is physical (AV:P). What does that mean for this vulnerability?
To exploit this vulnerability, an unauthenticated attacker needs to physically connect a malicious USB device to the victim's machine.
Windows Mobile Broadband: Windows Mobile Broadband
Microsoft: Microsoft
Cust
msrc
CVE-2024-29999MEDIUMCVSS 6.82024-05-14
CVE-2024-29999 [MEDIUM] CWE-190 Windows Mobile Broadband Driver Remote Code Execution Vulnerability
Windows Mobile Broadband Driver Remote Code Execution Vulnerability
FAQ: According to the CVSS metric, the attack vector is physical (AV:P). What does that mean for this vulnerability?
To exploit this vulnerability, an unauthenticated attacker needs to physically connect a malicious USB device to the victim's machine.
Windows Mobile Broadband: Windows Mobile Broadband
Microsoft: Microsoft
Cust
msrc
CVE-2024-30034MEDIUMCVSS 5.52024-05-14
CVE-2024-30034 [MEDIUM] CWE-843 Windows Cloud Files Mini Filter Driver Information Disclosure Vulnerability
Windows Cloud Files Mini Filter Driver Information Disclosure Vulnerability
FAQ: What type of information could be disclosed by this vulnerability?
Exploiting this vulnerability could allow the disclosure of certain kernel memory content.
Windows Cloud Files Mini Filter Driver: Windows Cloud Files Mini Filter Driver
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Informatio
msrc
CVE-2024-30004MEDIUMCVSS 6.82024-05-14
CVE-2024-30004 [MEDIUM] CWE-190 Windows Mobile Broadband Driver Remote Code Execution Vulnerability
Windows Mobile Broadband Driver Remote Code Execution Vulnerability
FAQ: According to the CVSS metric, the attack vector is physical (AV:P). What does that mean for this vulnerability?
To exploit this vulnerability, an unauthenticated attacker needs to physically connect a malicious USB device to the victim's machine.
Windows Mobile Broadband: Windows Mobile Broadband
Microsoft: Microsoft
Cust
msrc
CVE-2024-30012MEDIUMCVSS 6.82024-05-14
CVE-2024-30012 [MEDIUM] CWE-190 Windows Mobile Broadband Driver Remote Code Execution Vulnerability
Windows Mobile Broadband Driver Remote Code Execution Vulnerability
FAQ: According to the CVSS metric, the attack vector is physical (AV:P). What does that mean for this vulnerability?
To exploit this vulnerability, an unauthenticated attacker needs to physically connect a malicious USB device to the victim's machine.
Windows Mobile Broadband: Windows Mobile Broadband
Microsoft: Microsoft
Cust
msrc
CVE-2024-30005MEDIUMCVSS 6.82024-05-14
CVE-2024-30005 [MEDIUM] CWE-190 Windows Mobile Broadband Driver Remote Code Execution Vulnerability
Windows Mobile Broadband Driver Remote Code Execution Vulnerability
FAQ: According to the CVSS metric, the attack vector is physical (AV:P). What does that mean for this vulnerability?
To exploit this vulnerability, an unauthenticated attacker needs to physically connect a malicious USB device to the victim's machine.
Windows Mobile Broadband: Windows Mobile Broadband
Microsoft: Microsoft
Cust
msrc
CVE-2024-26237HIGHCVSS 7.82024-04-09
CVE-2024-26237 [HIGH] CWE-416 Windows Defender Credential Guard Elevation of Privilege Vulnerability
Windows Defender Credential Guard Elevation of Privilege Vulnerability
FAQ: What privileges could be gained by an attacker who successfully exploited the vulnerability?
A domain user could use this vulnerability to elevate privileges to SYSTEM assigned integrity level.
Windows Defender Credential Guard: Windows Defender Credential Guard
Microsoft: Microsoft
Customer Action Required: Yes
Impa
msrc
1 / 19Next →