Msrc Windows 11 Version 21H2 vulnerabilities

1,324 known vulnerabilities affecting msrc/windows_11_version_21h2.

Total CVEs
1,324
CISA KEV
61
actively exploited
Public exploits
20
Exploited in wild
70
Severity breakdown
CRITICAL38HIGH978MEDIUM305LOW3

Vulnerabilities

Page 50 of 67
CVE-2022-22031HIGHCVSS 7.82022-07-12
CVE-2022-22031 [HIGH] Windows Credential Guard Domain-joined Public Key Elevation of Privilege Vulnerability Windows Credential Guard Domain-joined Public Key Elevation of Privilege Vulnerability FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. Windows Credential Guard: Windows Credential Guard Microsoft: Microsoft Customer Action Required: Yes Impact: El
msrc
CVE-2022-30221HIGHCVSS 8.82022-07-12
CVE-2022-30221 [HIGH] Windows Graphics Component Remote Code Execution Vulnerability Windows Graphics Component Remote Code Execution Vulnerability FAQ: How would an attacker exploit this vulnerability? An attacker would have to convince a targeted user to connect to a malicious RDP server. Upon connecting, the malicious server could execute code on the victim's system in the context of the targeted user. FAQ: I am running Windows 7 Service Pack 1 or Windows Server 2008 R2 Service Pack 1. Is t
msrc
CVE-2022-22022HIGHCVSS 7.12022-07-12
CVE-2022-22022 [HIGH] Windows Print Spooler Elevation of Privilege Vulnerability Windows Print Spooler Elevation of Privilege Vulnerability FAQ: What privileges could be gained by an attacker who successfully exploited the vulnerability? An attacker would only be able to delete targeted files on a system. They would not gain privileges to view or modify file contents. Windows Print Spooler Components: Windows Print Spooler Components Microsoft: Microsoft Customer Action Required: Yes Impact
msrc
CVE-2022-22049HIGHCVSS 7.82022-07-12
CVE-2022-22049 [HIGH] Windows Client Server Run-time Subsystem (CSRSS) Elevation of Privilege Vulnerability Windows Client Server Run-time Subsystem (CSRSS) Elevation of Privilege Vulnerability FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. Windows Client/Server Runtime Subsystem: Windows Client/Server Runtime Subsystem Microsoft: Microsoft Customer Acti
msrc
CVE-2022-22047HIGHCVSS 7.8KEV2022-07-12
CVE-2022-22047 [HIGH] Windows Client Server Run-time Subsystem (CSRSS) Elevation of Privilege Vulnerability Windows Client Server Run-time Subsystem (CSRSS) Elevation of Privilege Vulnerability FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. Windows Client/Server Runtime Subsystem: Windows Client/Server Runtime Subsystem Microsoft: Microsoft Customer Acti
msrc
CVE-2022-22027HIGHCVSS 7.82022-07-12
CVE-2022-22027 [HIGH] Windows Fax Service Remote Code Execution Vulnerability Windows Fax Service Remote Code Execution Vulnerability FAQ: In what scenarios is my computer vulnerable? For Windows 11 and Windows 10 the FAX service is not installed by default. For the vulnerability to be exploitable, the Windows Fax and Scan feature needs to be enabled, and the Fax service needs to be running. Systems that do not have the Fax service running are not vulnerable. How can I verify whether the Fax se
msrc
CVE-2022-30225HIGHCVSS 7.12022-07-12
CVE-2022-30225 [HIGH] Windows Media Player Network Sharing Service Elevation of Privilege Vulnerability Windows Media Player Network Sharing Service Elevation of Privilege Vulnerability FAQ: According to the CVSS metrics, successful exploitation of this vulnerability could lead to no loss of confidentiality (C:N) but have major impact on integrity (I:H) and on availability (A:H). What does that mean for this vulnerability? An attacker who successfully exploited this vulnerability could affect t
msrc
CVE-2022-30224HIGHCVSS 7.02022-07-12
CVE-2022-30224 [HIGH] Windows Advanced Local Procedure Call (ALPC) Elevation of Privilege Vulnerability Windows Advanced Local Procedure Call (ALPC) Elevation of Privilege Vulnerability FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability? Successful exploitation of this vulnerability requires an attacker to win a race condition. FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability? An a
msrc
CVE-2022-22038HIGHCVSS 8.12022-07-12
CVE-2022-22038 [HIGH] Remote Procedure Call Runtime Remote Code Execution Vulnerability Remote Procedure Call Runtime Remote Code Execution Vulnerability FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability? Successful exploitation of this vulnerability requires an attacker to invest time in repeated exploitation attempts through sending constant or intermittent data. Windows Remote Procedure Call Runtime: Windows Remote Procedure
msrc
CVE-2022-22050HIGHCVSS 7.82022-07-12
CVE-2022-22050 [HIGH] Windows Fax Service Elevation of Privilege Vulnerability Windows Fax Service Elevation of Privilege Vulnerability FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. Windows Fax and Scan Service: Windows Fax and Scan Service Microsoft: Microsoft Customer Action Required: Yes Impact: Elevation of Privilege Exploit Status: Publicly Discl
msrc
CVE-2022-30202HIGHCVSS 7.02022-07-12
CVE-2022-30202 [HIGH] Windows Advanced Local Procedure Call (ALPC) Elevation of Privilege Vulnerability Windows Advanced Local Procedure Call (ALPC) Elevation of Privilege Vulnerability FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability? Successful exploitation of this vulnerability requires an attacker to win a race condition. FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability? An a
msrc
CVE-2022-30211HIGHCVSS 7.52022-07-12
CVE-2022-30211 [HIGH] Windows Layer 2 Tunneling Protocol (L2TP) Remote Code Execution Vulnerability Windows Layer 2 Tunneling Protocol (L2TP) Remote Code Execution Vulnerability FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability? Successful exploitation of this vulnerability requires an attacker to invest time in repeated exploitation attempts through sending constant or intermittent data. Windows Point-to-Point Tunneling Protoco
msrc
CVE-2022-30226HIGHCVSS 7.12022-07-12
CVE-2022-30226 [HIGH] Windows Print Spooler Elevation of Privilege Vulnerability Windows Print Spooler Elevation of Privilege Vulnerability FAQ: What privileges could be gained by an attacker who successfully exploited the vulnerability? An attacker would only be able to delete targeted files on a system. They would not gain privileges to view or modify file contents. Windows Print Spooler Components: Windows Print Spooler Components Microsoft: Microsoft Customer Action Required: Yes Impact
msrc
CVE-2022-22036HIGHCVSS 7.02022-07-12
CVE-2022-22036 [HIGH] Performance Counters for Windows Elevation of Privilege Vulnerability Performance Counters for Windows Elevation of Privilege Vulnerability FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability? Successful exploitation of this vulnerability requires an attacker to win a race condition. Windows Performance Counters: Windows Performance Counters Microsoft: Microsoft Customer Action Required: Yes Impact: Elevat
msrc
CVE-2022-30203HIGHCVSS 7.42022-07-12
CVE-2022-30203 [HIGH] Windows Boot Manager Security Feature Bypass Vulnerability Windows Boot Manager Security Feature Bypass Vulnerability FAQ: What kind of security feature could be bypassed by successfully exploiting this vulnerability? An attacker who successfully exploited this vulnerability could bypass Secure Boot. FAQ: According to the CVSS metric, a successful exploitation could lead to a scope change (S:C). What does this mean for this vulnerability? Successful exploitation of this v
msrc
CVE-2022-30222HIGHCVSS 8.42022-07-12
CVE-2022-30222 [HIGH] Windows Shell Remote Code Execution Vulnerability Windows Shell Remote Code Execution Vulnerability FAQ: How could an attacker exploit this vulnerability? An unauthenticated attacker could interact with the login screen of a vulnerable system in a specific manner to execute code on that system. Windows Shell: Windows Shell Microsoft: Microsoft Customer Action Required: Yes Impact: Remote Code Execution Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software
msrc
CVE-2022-22043HIGHCVSS 7.82022-07-12
CVE-2022-22043 [HIGH] Windows Fast FAT File System Driver Elevation of Privilege Vulnerability Windows Fast FAT File System Driver Elevation of Privilege Vulnerability FAQ: Why are there two different impacts in the Security Updates table? An attacker could potentially exploit this vulnerability to elevate privileges from a client-side application sandbox in earlier Microsoft operating systems. However, mitigation technologies in later Microsoft operating systems make this more difficult. For t
msrc
CVE-2022-22034HIGHCVSS 7.82022-07-12
CVE-2022-22034 [HIGH] Windows Graphics Component Elevation of Privilege Vulnerability Windows Graphics Component Elevation of Privilege Vulnerability FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. Microsoft Graphics Component: Microsoft Graphics Component Microsoft: Microsoft Customer Action Required: Yes Impact: Elevation of Privilege Exploit Status:
msrc
CVE-2022-30209HIGHCVSS 7.42022-07-12
CVE-2022-30209 [HIGH] Windows IIS Server Elevation of Privilege Vulnerability Windows IIS Server Elevation of Privilege Vulnerability FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability? Successful exploitation of this vulnerability requires an attacker to take additional actions prior to exploitation to prepare the target environment. FAQ: What privileges could be gained by an attacker who successfully exploited the vulnerability
msrc
CVE-2022-23825HIGHCVSS 6.52022-07-12
CVE-2022-23825 [MEDIUM] AMD: CVE-2022-23825 AMD CPU Branch Type Confusion AMD: CVE-2022-23825 AMD CPU Branch Type Confusion FAQ: Why is this AMD CVE included in the Security Update Guide? The vulnerability assigned to this CVE is in certain processor models offered by AMD. The mitigation for this vulnerability requires a Windows update. This CVE is being documented in the Security Update Guide to announce that the latest builds of Windows enable the mitigation and provide protection against the
msrc