Msrc Windows 11 Version 21H2 vulnerabilities
1,324 known vulnerabilities affecting msrc/windows_11_version_21h2.
Total CVEs
1,324
CISA KEV
61
actively exploited
Public exploits
20
Exploited in wild
70
Severity breakdown
CRITICAL38HIGH978MEDIUM305LOW3
Vulnerabilities
Page 42 of 67
CVE-2022-41047HIGHCVSS 8.82022-11-08
CVE-2022-41047 [HIGH] Microsoft ODBC Driver Remote Code Execution Vulnerability
Microsoft ODBC Driver Remote Code Execution Vulnerability
FAQ: How could an attacker exploit this vulnerability?
An attacker could exploit the vulnerability by tricking an authenticated user into attempting to connect to a malicious SQL server via ODBC, which could result in the server receiving a malicious networking packet. This could allow the attacker to execute code remotely on the client.
Windows ODBC Driver:
msrc
CVE-2022-41113HIGHCVSS 7.82022-11-08
CVE-2022-41113 [HIGH] Windows Win32 Kernel Subsystem Elevation of Privilege Vulnerability
Windows Win32 Kernel Subsystem Elevation of Privilege Vulnerability
FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability?
An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.
Microsoft Graphics Component: Microsoft Graphics Component
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Elevation of Privilege
Exploit
msrc
CVE-2022-41096HIGHCVSS 7.82022-11-08
CVE-2022-41096 [HIGH] Microsoft DWM Core Library Elevation of Privilege Vulnerability
Microsoft DWM Core Library Elevation of Privilege Vulnerability
FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability?
An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.
Windows DWM Core Library: Windows DWM Core Library
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Elevation of Privilege
Exploit Status: Publicly
msrc
CVE-2022-41050HIGHCVSS 7.82022-11-08
CVE-2022-41050 [HIGH] Windows Extensible File Allocation Table Elevation of Privilege Vulnerability
Windows Extensible File Allocation Table Elevation of Privilege Vulnerability
FAQ: What privileges could be gained by an attacker who successfully exploited the vulnerability?
A domain user could use this vulnerability to elevate privileges to SYSTEM assigned integrity level.
Windows Extensible File Allocation: Windows Extensible File Allocation
Microsoft: Microsoft
Customer Action Required: Y
msrc
CVE-2022-23824HIGHCVSS 5.52022-11-08
CVE-2022-23824 [MEDIUM] AMD: CVE-2022-23824 IBPB and Return Address Predictor Interactions
AMD: CVE-2022-23824 IBPB and Return Address Predictor Interactions
FAQ: Are any additional steps required to protect my system after installing the November Windows updates?
Customers who allow untrusted users to execute arbitrary code might wish to implement some extra security features within their systems. These features protect against the intra-process disclosure vectors that this speculative executi
msrc
CVE-2022-41095HIGHCVSS 7.82022-11-08
CVE-2022-41095 [HIGH] Windows Digital Media Receiver Elevation of Privilege Vulnerability
Windows Digital Media Receiver Elevation of Privilege Vulnerability
FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability?
An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.
Windows Digital Media: Windows Digital Media
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Elevation of Privilege
Exploit Status: Public
msrc
CVE-2022-41093HIGHCVSS 7.82022-11-08
CVE-2022-41093 [HIGH] Windows Advanced Local Procedure Call (ALPC) Elevation of Privilege Vulnerability
Windows Advanced Local Procedure Call (ALPC) Elevation of Privilege Vulnerability
FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?
Successful exploitation of this vulnerability requires an attacker to win a race condition.
FAQ: According to the CVSS metric, a successful exploitation could lead to a scope change (S:C). What d
msrc
CVE-2022-41039HIGHCVSS 8.12022-11-08
CVE-2022-41039 [HIGH] Windows Point-to-Point Tunneling Protocol Remote Code Execution Vulnerability
Windows Point-to-Point Tunneling Protocol Remote Code Execution Vulnerability
FAQ: How could an attacker exploit this vulnerability?
An unauthenticated attacker could send a specially crafted protocol message to a Routing and Remote Access Service (RRAS) server, which could lead to remote code execution (RCE) on the RAS server machine.
FAQ: According to the CVSS metric, the attack complexity is
msrc
CVE-2022-41088HIGHCVSS 8.12022-11-08
CVE-2022-41088 [HIGH] Windows Point-to-Point Tunneling Protocol Remote Code Execution Vulnerability
Windows Point-to-Point Tunneling Protocol Remote Code Execution Vulnerability
FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?
Successful exploitation of this vulnerability requires an attacker to win a race condition.
FAQ: How could an attacker exploit the vulnerability?
To exploit this vulnerability, an attacker would need to
msrc
CVE-2022-41100HIGHCVSS 7.82022-11-08
CVE-2022-41100 [HIGH] Windows Advanced Local Procedure Call (ALPC) Elevation of Privilege Vulnerability
Windows Advanced Local Procedure Call (ALPC) Elevation of Privilege Vulnerability
FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?
Successful exploitation of this vulnerability requires an attacker to win a race condition.
FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability?
An a
msrc
CVE-2022-41054HIGHCVSS 7.82022-11-08
CVE-2022-41054 [HIGH] Windows Resilient File System (ReFS) Elevation of Privilege Vulnerability
Windows Resilient File System (ReFS) Elevation of Privilege Vulnerability
FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability?
An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.
Windows Resilient File System (ReFS): Windows Resilient File System (ReFS)
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Elev
msrc
CVE-2022-41109HIGHCVSS 7.82022-11-08
CVE-2022-41109 [HIGH] Windows Win32k Elevation of Privilege Vulnerability
Windows Win32k Elevation of Privilege Vulnerability
FAQ: What privileges could be gained by an attacker who successfully exploited the vulnerability?
An attacker who successfully exploited this vulnerability could gain specific limited SYSTEM privileges.
Windows Win32K: Windows Win32K
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Elevation of Privilege
Exploit Status: Publicly Disclosed:No;Exploited:No;L
msrc
CVE-2022-41073HIGHCVSS 7.8KEV2022-11-08
CVE-2022-41073 [HIGH] Windows Print Spooler Elevation of Privilege Vulnerability
Windows Print Spooler Elevation of Privilege Vulnerability
FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability?
An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.
Windows Print Spooler Components: Windows Print Spooler Components
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Elevation of Privilege
Exploit Status: Pu
msrc
CVE-2022-41058HIGHCVSS 7.52022-11-08
CVE-2022-41058 [HIGH] Windows Network Address Translation (NAT) Denial of Service Vulnerability
Windows Network Address Translation (NAT) Denial of Service Vulnerability
Windows Network Address Translation (NAT): Windows Network Address Translation (NAT)
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Denial of Service
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation More Likely;Older Software Release:Exploitation More Likely;DOS:N/A
Refere
msrc
CVE-2022-41056HIGHCVSS 7.52022-11-08
CVE-2022-41056 [HIGH] Network Policy Server (NPS) RADIUS Protocol Denial of Service Vulnerability
Network Policy Server (NPS) RADIUS Protocol Denial of Service Vulnerability
Network Policy Server (NPS): Network Policy Server (NPS)
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Denial of Service
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A
Reference: https://catalog.upd
msrc
CVE-2022-41049MEDIUMCVSS 5.4KEV2022-11-08
CVE-2022-41049 [MEDIUM] Windows Mark of the Web Security Feature Bypass Vulnerability
Windows Mark of the Web Security Feature Bypass Vulnerability
FAQ: How could an attacker exploit the vulnerability?
In a web-based attack scenario, an attacker could host a malicious website that is designed to exploit the security feature bypass.
In an email or instant message attack scenario, the attacker could send the targeted user a specially crafted .url file that is designed to exploit the bypass.
Comp
msrc
CVE-2022-41098MEDIUMCVSS 5.52022-11-08
CVE-2022-41098 [MEDIUM] Windows GDI+ Information Disclosure Vulnerability
Windows GDI+ Information Disclosure Vulnerability
FAQ: What type of information could be disclosed by this vulnerability?
An attacker who successfully exploited this vulnerability could potentially read small portions of heap memory.
FAQ: According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?
Exploitation of the vulnerability requires that a user open a specially cr
msrc
CVE-2022-41086MEDIUMCVSS 6.42022-11-08
CVE-2022-41086 [MEDIUM] Windows Group Policy Elevation of Privilege Vulnerability
Windows Group Policy Elevation of Privilege Vulnerability
FAQ: What privileges could be gained by an attacker who successfully exploited the vulnerability?
An attacker who successfully exploited this vulnerability could gain domain administrator privileges.
FAQ: According to the CVSS metric, privileges required is high (PR:H). What does that mean for this vulnerability?
Successful exploitation of this vulnerabili
msrc
CVE-2022-41055MEDIUMCVSS 5.52022-11-08
CVE-2022-41055 [MEDIUM] Windows Human Interface Device Information Disclosure Vulnerability
Windows Human Interface Device Information Disclosure Vulnerability
FAQ: What type of information could be disclosed by this vulnerability?
The type of information that could be disclosed if an attacker successfully exploited this vulnerability is the contents of Kernel memory. An attacker could read the contents of Kernel memory from a user mode process.
Windows Devices Human Interface: Windows Devices
msrc
CVE-2022-41097MEDIUMCVSS 6.52022-11-08
CVE-2022-41097 [MEDIUM] Network Policy Server (NPS) RADIUS Protocol Information Disclosure Vulnerability
Network Policy Server (NPS) RADIUS Protocol Information Disclosure Vulnerability
FAQ: What type of information could be disclosed by this vulnerability?
Exploiting this vulnerability could allow the disclosure of initialized or uninitialized memory in the process heap.
Network Policy Server (NPS): Network Policy Server (NPS)
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Info
msrc