Msrc Windows 10 Version 22H2 vulnerabilities

1,609 known vulnerabilities affecting msrc/windows_10_version_22h2.

Total CVEs
1,609
CISA KEV
72
actively exploited
Public exploits
28
Exploited in wild
47
Severity breakdown
CRITICAL34HIGH1143MEDIUM425LOW7

Vulnerabilities

Page 39 of 81
CVE-2024-43565HIGHCVSS 7.52024-10-08
CVE-2024-43565 [HIGH] CWE-125 Windows Network Address Translation (NAT) Denial of Service Vulnerability Windows Network Address Translation (NAT) Denial of Service Vulnerability Windows Network Address Translation (NAT): Windows Network Address Translation (NAT) Microsoft: Microsoft Customer Action Required: Yes Impact: Denial of Service Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely Reference: https://catalog.update.microsoft.com/v7/sit
msrc
CVE-2024-43516HIGHCVSS 7.82024-10-08
CVE-2024-43516 [HIGH] CWE-822 Windows Secure Kernel Mode Elevation of Privilege Vulnerability Windows Secure Kernel Mode Elevation of Privilege Vulnerability FAQ: Are there additional actions I need to take after installing November 12, 2024 update? This update affects a component of Virtualization-based Security (VBS). The policy mitigations described in KB5042562: Guidance for blocking rollback of Virtualization-based Security (VBS) related security updates - Microsoft Support have been updat
msrc
CVE-2024-43535HIGHCVSS 7.02024-10-08
CVE-2024-43535 [HIGH] CWE-416 Windows Kernel-Mode Driver Elevation of Privilege Vulnerability Windows Kernel-Mode Driver Elevation of Privilege Vulnerability FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability? Successful exploitation of this vuln
msrc
CVE-2024-43511HIGHCVSS 7.02024-10-08
CVE-2024-43511 [HIGH] CWE-367 Windows Kernel Elevation of Privilege Vulnerability Windows Kernel Elevation of Privilege Vulnerability FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. FAQ: Are there additional actions I need to take after installing November 12, 2024 update? This update affects a component of Virtualization-based Security (VBS). The policy mi
msrc
CVE-2024-43518HIGHCVSS 8.82024-10-08
CVE-2024-43518 [HIGH] CWE-122 Windows Telephony Server Remote Code Execution Vulnerability Windows Telephony Server Remote Code Execution Vulnerability FAQ: According to the CVSS metric, user interaction is required (UI:R) and privileges required are none (PR:N). What does that mean for this vulnerability? An unauthorized attacker must wait for a user to initiate a connection. FAQ: According to the CVSS metric, the attack vector is network (AV:N) and the user interaction is required (UI:R). Wh
msrc
CVE-2024-43560HIGHCVSS 7.82024-10-08
CVE-2024-43560 [HIGH] CWE-122 Microsoft Windows Storage Port Driver Elevation of Privilege Vulnerability Microsoft Windows Storage Port Driver Elevation of Privilege Vulnerability FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. Windows Storage Port Driver: Windows Storage Port Driver Microsoft: Microsoft Customer Action Required: Yes Impact: Elevation of
msrc
CVE-2024-43562HIGHCVSS 7.52024-10-08
CVE-2024-43562 [HIGH] CWE-125 Windows Network Address Translation (NAT) Denial of Service Vulnerability Windows Network Address Translation (NAT) Denial of Service Vulnerability Windows Network Address Translation (NAT): Windows Network Address Translation (NAT) Microsoft: Microsoft Customer Action Required: Yes Impact: Denial of Service Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely Reference: https://catalog.update.microsoft.com/v7/sit
msrc
CVE-2024-43583HIGHCVSS 7.82024-10-08
CVE-2024-43583 [HIGH] CWE-250 Winlogon Elevation of Privilege Vulnerability Winlogon Elevation of Privilege Vulnerability FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. FAQ: Are there any further actions I need to take to be protected from this vulnerability? Yes. To address this vulnerability, ensure that a Microsoft first-party Input Method Editor (IME)
msrc
CVE-2024-43514HIGHCVSS 7.82024-10-08
CVE-2024-43514 [HIGH] CWE-415 Windows Resilient File System (ReFS) Elevation of Privilege Vulnerability Windows Resilient File System (ReFS) Elevation of Privilege Vulnerability FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. Windows NTFS: Windows NTFS Microsoft: Microsoft Customer Action Required: Yes Impact: Elevation of Privilege Exploit Status: Publ
msrc
CVE-2024-43572HIGHCVSS 7.8KEV2024-10-08
CVE-2024-43572 [HIGH] CWE-707 Microsoft Management Console Remote Code Execution Vulnerability Microsoft Management Console Remote Code Execution Vulnerability FAQ: What does the security update provide to mitigate the risks associated with this vulnerability? The security update will prevent untrusted Microsoft Saved Console (MSC) files from being opened to protect customers against the risks associated with this vulnerability. FAQ: According to the CVSS metric, the attack vector is local (AV
msrc
CVE-2024-38149HIGHCVSS 7.52024-10-08
CVE-2024-38149 [HIGH] CWE-400 BranchCache Denial of Service Vulnerability BranchCache Denial of Service Vulnerability BranchCache: BranchCache Microsoft: Microsoft Customer Action Required: Yes Impact: Denial of Service Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5044277 Reference: https://support.microsoft.com/help/5044277 Reference: https://catalog.update.micr
msrc
CVE-2024-43563HIGHCVSS 7.82024-10-08
CVE-2024-43563 [HIGH] CWE-591 Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. Windows Ancillary Function Driver for WinSock: Windows Ancillary Function Driver for WinSock Microsoft: Microsoft
msrc
CVE-2024-43532HIGHCVSS 8.82024-10-08
CVE-2024-43532 [HIGH] CWE-636 Remote Registry Service Elevation of Privilege Vulnerability Remote Registry Service Elevation of Privilege Vulnerability FAQ: How could an attacker exploit the vulnerability? To exploit this vulnerability, an attacker could execute a specially crafted malicious script which executes an RPC call to an RPC host. This could result in elevation of privilege on the server. FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerabilit
msrc
CVE-2024-43556HIGHCVSS 7.82024-10-08
CVE-2024-43556 [HIGH] CWE-416 Windows Graphics Component Elevation of Privilege Vulnerability Windows Graphics Component Elevation of Privilege Vulnerability FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. Microsoft Graphics Component: Microsoft Graphics Component Microsoft: Microsoft Customer Action Required: Yes Impact: Elevation of Privilege Exploit
msrc
CVE-2024-43501HIGHCVSS 7.82024-10-08
CVE-2024-43501 [HIGH] CWE-59 Windows Common Log File System Driver Elevation of Privilege Vulnerability Windows Common Log File System Driver Elevation of Privilege Vulnerability FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. Windows Common Log File System Driver: Windows Common Log File System Driver Microsoft: Microsoft Customer Action Required: Yes I
msrc
CVE-2024-6197HIGHCVSS 8.82024-10-08
CVE-2024-6197 [HIGH] CWE-590 Hackerone: CVE-2024-6197 Freeing stack buffer in utf8asn1str Hackerone: CVE-2024-6197 Freeing stack buffer in utf8asn1str NIST NVD Details: https://nvd.nist.gov/vuln/detail/CVE-2024-6197 FAQ: According to the CVSS metric, the attack vector is network (AV:N) and the user interaction is required (UI:R). What is the target context of the remote code execution? This attack requires a client to connect to a malicious server, and that could allow the attacker to gain cod
msrc
CVE-2024-43582HIGHCVSS 8.12024-10-08
CVE-2024-43582 [HIGH] CWE-416 Remote Desktop Protocol Server Remote Code Execution Vulnerability Remote Desktop Protocol Server Remote Code Execution Vulnerability FAQ: How could an attacker exploit this vulnerability? To exploit this vulnerability, an unauthenticated attacker would need to send malformed packets to a websocket listening port. This could result in remote code execution on the server side with the same permissions as the websocket service. FAQ: According to the CVSS metric, the
msrc
CVE-2024-43551HIGHCVSS 7.82024-10-08
CVE-2024-43551 [HIGH] CWE-59 Windows Storage Elevation of Privilege Vulnerability Windows Storage Elevation of Privilege Vulnerability FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. Windows Storage: Windows Storage Microsoft: Microsoft Customer Action Required: Yes Impact: Elevation of Privilege Exploit Status: Publicly Disclosed:No;Exploited:No;Latest
msrc
CVE-2024-43615HIGHCVSS 7.12024-10-08
CVE-2024-43615 [HIGH] CWE-73 Microsoft OpenSSH for Windows Remote Code Execution Vulnerability Microsoft OpenSSH for Windows Remote Code Execution Vulnerability FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability? Successful exploitation of this vulnerability requires an attacker to gather information specific to the environment of the targeted component. FAQ: According to the CVSS metric, privileges required is low (PR:L). What d
msrc
CVE-2024-43519HIGHCVSS 8.82024-10-08
CVE-2024-43519 [HIGH] CWE-197 Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability FAQ: According to the CVSS metric, the attack vector is network (AV:N) and the user interaction is required (UI:R). What is the target context of the remote code execution? An authenticated victim who is connected to the network must be tricked or persuaded to connect to a malicious SQL database using th
msrc