Msrc Windows 10 Version 2004 vulnerabilities

754 known vulnerabilities affecting msrc/windows_10_version_2004.

Total CVEs
754
CISA KEV
18
actively exploited
Public exploits
6
Exploited in wild
19
Severity breakdown
CRITICAL8HIGH559MEDIUM186LOW1

Vulnerabilities

Page 19 of 38
CVE-2021-1656MEDIUMCVSS 5.52021-01-12
CVE-2021-1656 [MEDIUM] TPM Device Driver Information Disclosure Vulnerability TPM Device Driver Information Disclosure Vulnerability FAQ: What type of information could be disclosed by this vulnerability? The type of information that could be disclosed if an attacker successfully exploited this vulnerability is memory layout - the vulnerability allows an attacker to collect information that facilitates predicting addressing of the memory. Windows TPM Device Driver: Windows TPM Device Driver M
msrc
CVE-2021-1679MEDIUMCVSS 6.52021-01-12
CVE-2021-1679 [MEDIUM] Windows CryptoAPI Denial of Service Vulnerability Windows CryptoAPI Denial of Service Vulnerability Windows CryptoAPI: Windows CryptoAPI Microsoft: Microsoft Customer Action Required: Yes Impact: Denial of Service Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4598242 Reference: https://
msrc
CVE-2021-1683MEDIUMCVSS 5.02021-01-12
CVE-2021-1683 [MEDIUM] Windows Bluetooth Security Feature Bypass Vulnerability Windows Bluetooth Security Feature Bypass Vulnerability Description: Microsoft is aware of the "Impersonation in the Passkey Entry Protocol" vulnerability. For more information regarding the vulnerability, please see this statement from the Bluetooth SIG. To address the vulnerability, Microsoft has released a software update that will fail attempts to pair if the remote device exchanges a public key with the same X c
msrc
CVE-2021-1684MEDIUMCVSS 5.02021-01-12
CVE-2021-1684 [MEDIUM] Windows Bluetooth Security Feature Bypass Vulnerability Windows Bluetooth Security Feature Bypass Vulnerability Description: Microsoft is aware of the "Impersonation in the Passkey Entry Protocol" vulnerability. For more information regarding the vulnerability, please see this statement from the Bluetooth SIG. To address the vulnerability, Microsoft has released a software update that will fail attempts to pair if the remote device exchanges a public key with the same X c
msrc
CVE-2020-17103HIGHCVSS 7.02020-12-08
CVE-2020-17103 [HIGH] Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability Microsoft Windows: Microsoft Windows Microsoft: Microsoft Customer Action Required: Yes Impact: Elevation of Privilege Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely Reference: https://catalog.update.microsoft.com/v7/si
msrc
CVE-2020-17140HIGHCVSS 8.12020-12-08
CVE-2020-17140 [HIGH] Windows SMB Information Disclosure Vulnerability Windows SMB Information Disclosure Vulnerability FAQ: Does this security update target the Server or Client side? In this case the fix targets both sides. Specifically the smb2.srv binary is the primary fix target, which is housed on both sides of the connection. FAQ: What type of information could be disclosed by this vulnerability? The type of information that could be disclosed if an attacker successfully exploited this
msrc
CVE-2020-17092HIGHCVSS 7.82020-12-08
CVE-2020-17092 [HIGH] Windows Network Connections Service Elevation of Privilege Vulnerability Windows Network Connections Service Elevation of Privilege Vulnerability Microsoft Windows: Microsoft Windows Microsoft: Microsoft Customer Action Required: Yes Impact: Elevation of Privilege Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely Reference: https://catalog.update.microsoft.com/v7/site/Sea
msrc
CVE-2020-16962HIGHCVSS 7.82020-12-08
CVE-2020-16962 [HIGH] Windows Backup Engine Elevation of Privilege Vulnerability Windows Backup Engine Elevation of Privilege Vulnerability Windows Backup Engine: Windows Backup Engine Microsoft: Microsoft Customer Action Required: Yes Impact: Elevation of Privilege Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4592438
msrc
CVE-2020-17136HIGHCVSS 7.8PoC2020-12-08
CVE-2020-17136 [HIGH] Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability Microsoft Windows: Microsoft Windows Microsoft: Microsoft Customer Action Required: Yes Impact: Elevation of Privilege Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely Reference: https://catalog.update.microsoft.com/v7/si
msrc
CVE-2020-17096HIGHCVSS 7.52020-12-08
CVE-2020-17096 [HIGH] Windows NTFS Remote Code Execution Vulnerability Windows NTFS Remote Code Execution Vulnerability FAQ: How would an attacker exploit this vulnerability? A local attacker could run a specially crafted application that would elevate the attacker's privileges. A remote attacker with SMBv2 access to a vulnerable system could send specially crafted requests over a network to exploit this vulnerability and execute code on the target system. Windows SMB: Windows SMB Microsoft:
msrc
CVE-2020-16958HIGHCVSS 7.82020-12-08
CVE-2020-16958 [HIGH] Windows Backup Engine Elevation of Privilege Vulnerability Windows Backup Engine Elevation of Privilege Vulnerability Windows Backup Engine: Windows Backup Engine Microsoft: Microsoft Customer Action Required: Yes Impact: Elevation of Privilege Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4592438
msrc
CVE-2020-16964HIGHCVSS 7.82020-12-08
CVE-2020-16964 [HIGH] Windows Backup Engine Elevation of Privilege Vulnerability Windows Backup Engine Elevation of Privilege Vulnerability Windows Backup Engine: Windows Backup Engine Microsoft: Microsoft Customer Action Required: Yes Impact: Elevation of Privilege Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4592438
msrc
CVE-2020-17134HIGHCVSS 7.82020-12-08
CVE-2020-17134 [HIGH] Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability Microsoft Windows: Microsoft Windows Microsoft: Microsoft Customer Action Required: Yes Impact: Elevation of Privilege Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely Reference: https://catalog.update.microsoft.com/v7/si
msrc
CVE-2020-16960HIGHCVSS 7.82020-12-08
CVE-2020-16960 [HIGH] Windows Backup Engine Elevation of Privilege Vulnerability Windows Backup Engine Elevation of Privilege Vulnerability Windows Backup Engine: Windows Backup Engine Microsoft: Microsoft Customer Action Required: Yes Impact: Elevation of Privilege Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4592438
msrc
CVE-2020-16959HIGHCVSS 7.82020-12-08
CVE-2020-16959 [HIGH] Windows Backup Engine Elevation of Privilege Vulnerability Windows Backup Engine Elevation of Privilege Vulnerability Windows Backup Engine: Windows Backup Engine Microsoft: Microsoft Customer Action Required: Yes Impact: Elevation of Privilege Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4592438
msrc
CVE-2020-16961HIGHCVSS 7.82020-12-08
CVE-2020-16961 [HIGH] Windows Backup Engine Elevation of Privilege Vulnerability Windows Backup Engine Elevation of Privilege Vulnerability Windows Backup Engine: Windows Backup Engine Microsoft: Microsoft Customer Action Required: Yes Impact: Elevation of Privilege Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4592438
msrc
CVE-2020-16963HIGHCVSS 7.82020-12-08
CVE-2020-16963 [HIGH] Windows Backup Engine Elevation of Privilege Vulnerability Windows Backup Engine Elevation of Privilege Vulnerability Windows Backup Engine: Windows Backup Engine Microsoft: Microsoft Customer Action Required: Yes Impact: Elevation of Privilege Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4592446
msrc
CVE-2020-17094MEDIUMCVSS 5.52020-12-08
CVE-2020-17094 [MEDIUM] Windows Error Reporting Information Disclosure Vulnerability Windows Error Reporting Information Disclosure Vulnerability FAQ: What type of information could be disclosed by this vulnerability? The type of information that could be disclosed if an attacker successfully exploited this vulnerability is unauthorized file system access - reading from the file system. Windows Error Reporting: Windows Error Reporting Microsoft: Microsoft Customer Action Required: Yes Impac
msrc
CVE-2020-17098MEDIUMCVSS 5.52020-12-08
CVE-2020-17098 [MEDIUM] Windows GDI+ Information Disclosure Vulnerability Windows GDI+ Information Disclosure Vulnerability FAQ: What type of information could be disclosed by this vulnerability? The type of information that could be disclosed if an attacker successfully exploited this vulnerability is memory layout - the vulnerability allows an attacker to collect information that facilitates predicting addressing of the memory. Microsoft Graphics Component: Microsoft Graphics Component Micr
msrc
CVE-2020-17097LOWCVSS 3.32020-12-08
CVE-2020-17097 [LOW] Windows Digital Media Receiver Elevation of Privilege Vulnerability Windows Digital Media Receiver Elevation of Privilege Vulnerability Windows Media: Windows Media Microsoft: Microsoft Customer Action Required: Yes Impact: Elevation of Privilege Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB459243
msrc