Msrc Windows 10 Version 2004 For X64-Based Systems vulnerabilities
186 known vulnerabilities affecting msrc/windows_10_version_2004_for_x64-based_systems.
Total CVEs
186
CISA KEV
9
actively exploited
Public exploits
4
Exploited in wild
9
Severity breakdown
CRITICAL3HIGH126MEDIUM56LOW1
Vulnerabilities
Page 1 of 10
CVE-2021-43237HIGHCVSS 7.82021-12-14
CVE-2021-43237 [HIGH] Windows Setup Elevation of Privilege Vulnerability
Windows Setup Elevation of Privilege Vulnerability
Windows Update Stack: Windows Update Stack
Microsoft: Microsoft
Impact: Elevation of Privilege
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A
Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5008206
Reference: https://catalog.update.micro
msrc
CVE-2021-43239HIGHCVSS 7.12021-12-14
CVE-2021-43239 [HIGH] Windows Recovery Environment Agent Elevation of Privilege Vulnerability
Windows Recovery Environment Agent Elevation of Privilege Vulnerability
Windows Update Stack: Windows Update Stack
Microsoft: Microsoft
Impact: Elevation of Privilege
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A
Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB500821
msrc
CVE-2021-43240HIGHCVSS 7.82021-12-14
CVE-2021-43240 [HIGH] NTFS Set Short Name Elevation of Privilege Vulnerability
NTFS Set Short Name Elevation of Privilege Vulnerability
Windows NTFS: Windows NTFS
Microsoft: Microsoft
Impact: Elevation of Privilege
Exploit Status: Publicly Disclosed:Yes;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A
Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5008206
Reference: https://catalog.update.microsof
msrc
CVE-2021-43246MEDIUMCVSS 5.62021-12-14
CVE-2021-43246 [MEDIUM] Windows Hyper-V Denial of Service Vulnerability
Windows Hyper-V Denial of Service Vulnerability
Role: Windows Hyper-V: Role: Windows Hyper-V
Microsoft: Microsoft
Impact: Denial of Service
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A
Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5008218
Reference: https://support.microsoft.com/help/
msrc
CVE-2021-26443CRITICALCVSS 9.02021-11-09
CVE-2021-26443 [CRITICAL] Microsoft Virtual Machine Bus (VMBus) Remote Code Execution Vulnerability
Microsoft Virtual Machine Bus (VMBus) Remote Code Execution Vulnerability
FAQ: How could an attacker exploit this vulnerability?
A remote code execution vulnerability exists when a VM guest fails to properly handle communication on a VMBus channel. To exploit the vulnerability, an authenticated attacker could send a specially crafted communication on the VMBus channel from the guest VM to the Hos
msrc
CVE-2021-42286HIGHCVSS 7.82021-11-09
CVE-2021-42286 [HIGH] Windows Core Shell SI Host Extension Framework for Composable Shell Elevation of Privilege Vulnerability
Windows Core Shell SI Host Extension Framework for Composable Shell Elevation of Privilege Vulnerability
Windows Core Shell: Windows Core Shell
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Elevation of Privilege
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less L
msrc
CVE-2021-42288MEDIUMCVSS 5.72021-11-09
CVE-2021-42288 [MEDIUM] Windows Hello Security Feature Bypass Vulnerability
Windows Hello Security Feature Bypass Vulnerability
Windows Hello: Windows Hello
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Security Feature Bypass
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely
Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5007206
Reference: https://suppor
msrc
CVE-2021-42284MEDIUMCVSS 6.82021-11-09
CVE-2021-42284 [MEDIUM] Windows Hyper-V Denial of Service Vulnerability
Windows Hyper-V Denial of Service Vulnerability
FAQ: What are the vulnerable configurations of Hyper-V?
Any installation of Hyper-V that exposes one or more virtual switches to guests would be vulnerable.
Role: Windows Hyper-V: Role: Windows Hyper-V
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Denial of Service
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Li
msrc
CVE-2021-42274MEDIUMCVSS 6.82021-11-09
CVE-2021-42274 [MEDIUM] Windows Hyper-V Discrete Device Assignment (DDA) Denial of Service Vulnerability
Windows Hyper-V Discrete Device Assignment (DDA) Denial of Service Vulnerability
Role: Windows Hyper-V: Role: Windows Hyper-V
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Denial of Service
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely
Reference: https://catalog.update.micr
msrc
CVE-2021-41330HIGHCVSS 7.82021-10-12
CVE-2021-41330 [HIGH] Microsoft Windows Media Foundation Remote Code Execution Vulnerability
Microsoft Windows Media Foundation Remote Code Execution Vulnerability
Microsoft Windows Codecs Library: Microsoft Windows Codecs Library
Microsoft: Microsoft
Impact: Remote Code Execution
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A
Reference: https://catalog.update.microsoft.com/v7/site/S
msrc
CVE-2021-40461HIGHCVSS 8.02021-10-12
CVE-2021-40461 [HIGH] Windows Hyper-V Remote Code Execution Vulnerability
Windows Hyper-V Remote Code Execution Vulnerability
Role: Windows Hyper-V: Role: Windows Hyper-V
Microsoft: Microsoft
Impact: Remote Code Execution
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A
Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5006672
Reference: https://support.microsoft
msrc
CVE-2021-41334HIGHCVSS 7.02021-10-12
CVE-2021-41334 [HIGH] Windows Desktop Bridge Elevation of Privilege Vulnerability
Windows Desktop Bridge Elevation of Privilege Vulnerability
Windows Desktop Bridge: Windows Desktop Bridge
Microsoft: Microsoft
Impact: Elevation of Privilege
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A
Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5006670
Reference: https:
msrc
CVE-2021-41357HIGHCVSS 7.8KEV2021-10-12
CVE-2021-41357 [HIGH] Win32k Elevation of Privilege Vulnerability
Win32k Elevation of Privilege Vulnerability
Windows Win32K: Windows Win32K
Microsoft: Microsoft
Impact: Elevation of Privilege
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation More Likely;Older Software Release:Exploitation More Likely;DOS:N/A
Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5006670
Reference: https://support.microsoft.com/help/5006670
Reference:
msrc
CVE-2021-41346MEDIUMCVSS 5.32021-10-12
CVE-2021-41346 [MEDIUM] Console Window Host Security Feature Bypass Vulnerability
Console Window Host Security Feature Bypass Vulnerability
Console Window Host: Console Window Host
Microsoft: Microsoft
Impact: Security Feature Bypass
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A
Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5006670
Reference: https://suppo
msrc
CVE-2021-41339MEDIUMCVSS 4.72021-10-12
CVE-2021-41339 [MEDIUM] Microsoft DWM Core Library Elevation of Privilege Vulnerability
Microsoft DWM Core Library Elevation of Privilege Vulnerability
Windows DWM Core Library: Windows DWM Core Library
Microsoft: Microsoft
Impact: Elevation of Privilege
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A
Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5006667
Ref
msrc
CVE-2021-40468MEDIUMCVSS 5.52021-10-12
CVE-2021-40468 [MEDIUM] Windows Bind Filter Driver Information Disclosure Vulnerability
Windows Bind Filter Driver Information Disclosure Vulnerability
FAQ: What type of information could be disclosed by this vulnerability?
The type of information that could be disclosed if an attacker successfully exploited this vulnerability is the contents of Kernel memory. An attacker could read the contents of Kernel memory from a user mode process.
Windows Bind Filter Driver: Windows Bind Filter Driver
msrc
CVE-2021-36966HIGHCVSS 7.82021-09-14
CVE-2021-36966 [HIGH] Windows Subsystem for Linux Elevation of Privilege Vulnerability
Windows Subsystem for Linux Elevation of Privilege Vulnerability
Windows Subsystem for Linux: Windows Subsystem for Linux
Microsoft: Microsoft
Impact: Elevation of Privilege
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A
Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB500556
msrc
CVE-2021-36948HIGHCVSS 7.8KEV2021-08-10
CVE-2021-36948 [HIGH] Windows Update Medic Service Elevation of Privilege Vulnerability
Windows Update Medic Service Elevation of Privilege Vulnerability
Windows Update: Windows Update
Microsoft: Microsoft
Impact: Elevation of Privilege
Exploit Status: Publicly Disclosed:No;Exploited:Yes;Latest Software Release:Exploitation Detected;Older Software Release:Exploitation Detected;DOS:N/A
Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005030
Reference: https://support
msrc
CVE-2021-26431HIGHCVSS 7.82021-08-10
CVE-2021-26431 [HIGH] Windows Recovery Environment Agent Elevation of Privilege Vulnerability
Windows Recovery Environment Agent Elevation of Privilege Vulnerability
Windows Update Assistant: Windows Update Assistant
Microsoft: Microsoft
Impact: Elevation of Privilege
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A
Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=
msrc
CVE-2021-34486HIGHCVSS 7.8KEV2021-08-10
CVE-2021-34486 [HIGH] Windows Event Tracing Elevation of Privilege Vulnerability
Windows Event Tracing Elevation of Privilege Vulnerability
Windows Event Tracing: Windows Event Tracing
Microsoft: Microsoft
Impact: Elevation of Privilege
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A
Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005030
Reference: https://su
msrc
1 / 10Next →