Msrc Windows 11 Version 22H2 vulnerabilities
1,469 known vulnerabilities affecting msrc/windows_11_version_22h2.
Total CVEs
1,469
CISA KEV
65
actively exploited
Public exploits
26
Exploited in wild
47
Severity breakdown
CRITICAL32HIGH1032MEDIUM398LOW7
Vulnerabilities
Page 11 of 74
CVE-2025-49689HIGHCVSS 7.82025-07-08
CVE-2025-49689 [HIGH] CWE-190 Microsoft Virtual Hard Disk Elevation of Privilege Vulnerability
Microsoft Virtual Hard Disk Elevation of Privilege Vulnerability
Description: Integer overflow or wraparound in Virtual Hard Disk (VHDX) allows an unauthorized attacker to elevate privileges locally.
FAQ: According to the CVSS metric, the attack vector is local (AV:L) while user interaction is required (UI:R). What does that mean for this vulnerability?
An attacker can trick a local user on a vulnera
msrc
CVE-2025-47972HIGHCVSS 8.02025-07-08
CVE-2025-47972 [HIGH] CWE-362 Windows Input Method Editor (IME) Elevation of Privilege Vulnerability
Windows Input Method Editor (IME) Elevation of Privilege Vulnerability
Description: Concurrent execution using shared resource with improper synchronization ('race condition') in Microsoft Input Method Editor (IME) allows an authorized attacker to elevate privileges over a network.
FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerabilit
msrc
CVE-2025-48820HIGHCVSS 7.82025-07-08
CVE-2025-48820 [HIGH] CWE-59 Windows AppX Deployment Service Elevation of Privilege Vulnerability
Windows AppX Deployment Service Elevation of Privilege Vulnerability
Description: Improper link resolution before file access ('link following') in Windows AppX Deployment Service allows an authorized attacker to elevate privileges locally.
FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability?
An authenticated attacker would be able to delete targeted f
msrc
CVE-2025-48814HIGHCVSS 7.52025-07-08
CVE-2025-48814 [HIGH] CWE-306 Remote Desktop Licensing Service Security Feature Bypass Vulnerability
Remote Desktop Licensing Service Security Feature Bypass Vulnerability
Description: Missing authentication for critical function in Windows Remote Desktop Licensing Service allows an unauthorized attacker to bypass a security feature over a network.
FAQ: What security feature is being bypassed?
An attacker with a machine-in-the-middle (MitM) position who successfully exploited this vulnerabilit
msrc
CVE-2025-49690HIGHCVSS 7.42025-07-08
CVE-2025-49690 [HIGH] CWE-362 Capability Access Management Service (camsvc) Elevation of Privilege Vulnerability
Capability Access Management Service (camsvc) Elevation of Privilege Vulnerability
Description: Concurrent execution using shared resource with improper synchronization ('race condition') in Capability Access Management Service (camsvc) allows an unauthorized attacker to elevate privileges locally.
FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does th
msrc
CVE-2025-49726HIGHCVSS 7.82025-07-08
CVE-2025-49726 [HIGH] CWE-416 Windows Notification Elevation of Privilege Vulnerability
Windows Notification Elevation of Privilege Vulnerability
Description: Use after free in Windows Notification allows an authorized attacker to elevate privileges locally.
FAQ: What privileges could be gained by an attacker who successfully exploited the vulnerability?
An attacker who successfully exploited this vulnerability could potentially gain the ability to crash the system by exploiting the use-after-
msrc
CVE-2025-47975HIGHCVSS 7.02025-07-08
CVE-2025-47975 [HIGH] CWE-415 Windows Simple Search and Discovery Protocol (SSDP) Service Elevation of Privilege Vulnerability
Windows Simple Search and Discovery Protocol (SSDP) Service Elevation of Privilege Vulnerability
Description: Double free in Windows SSDP Service allows an authorized attacker to elevate privileges locally.
FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?
Successful exploitation of this vulnerability r
msrc
CVE-2025-49660HIGHCVSS 7.82025-07-08
CVE-2025-49660 [HIGH] CWE-416 Windows Event Tracing Elevation of Privilege Vulnerability
Windows Event Tracing Elevation of Privilege Vulnerability
Description: Use after free in Windows Event Tracing allows an authorized attacker to elevate privileges locally.
FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability?
An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.
Windows Event Tracing: Windows Event Tracing
Mi
msrc
CVE-2025-47971HIGHCVSS 7.82025-07-08
CVE-2025-47971 [HIGH] CWE-126 Microsoft Virtual Hard Disk Elevation of Privilege Vulnerability
Microsoft Virtual Hard Disk Elevation of Privilege Vulnerability
Description: Buffer over-read in Virtual Hard Disk (VHDX) allows an unauthorized attacker to elevate privileges locally.
FAQ: According to the CVSS metric, the attack vector is local (AV:L) while user interaction is required (UI:R). What does that mean for this vulnerability?
An attacker can trick a local user on a vulnerable system int
msrc
CVE-2025-48815HIGHCVSS 7.82025-07-08
CVE-2025-48815 [HIGH] CWE-843 Windows Simple Search and Discovery Protocol (SSDP) Service Elevation of Privilege Vulnerability
Windows Simple Search and Discovery Protocol (SSDP) Service Elevation of Privilege Vulnerability
Description: Access of resource using incompatible type ('type confusion') in Windows SSDP Service allows an authorized attacker to elevate privileges locally.
FAQ: What privileges could be gained by an attacker who successfully exploited the vulnerability?
An attacker who
msrc
CVE-2025-49725HIGHCVSS 7.82025-07-08
CVE-2025-49725 [HIGH] CWE-416 Windows Notification Elevation of Privilege Vulnerability
Windows Notification Elevation of Privilege Vulnerability
Description: Use after free in Windows Notification allows an authorized attacker to elevate privileges locally.
FAQ: What privileges could be gained by an attacker who successfully exploited the vulnerability?
An attacker who successfully exploited this vulnerability could potentially gain the ability to crash the system by exploiting the use-after-
msrc
CVE-2025-49683HIGHCVSS 7.8PoC2025-07-08
CVE-2025-49683 [HIGH] CWE-190 Microsoft Virtual Hard Disk Remote Code Execution Vulnerability
Microsoft Virtual Hard Disk Remote Code Execution Vulnerability
Description: Integer overflow or wraparound in Virtual Hard Disk (VHDX) allows an unauthorized attacker to execute code locally.
FAQ: According to the CVSS metric, the attack vector is local (AV:L) while user interaction is required (UI:R). What does that mean for this vulnerability?
An attacker can trick a local user on a vulnerable syst
msrc
CVE-2025-47976HIGHCVSS 7.82025-07-08
CVE-2025-47976 [HIGH] CWE-416 Windows Simple Search and Discovery Protocol (SSDP) Service Elevation of Privilege Vulnerability
Windows Simple Search and Discovery Protocol (SSDP) Service Elevation of Privilege Vulnerability
Description: Use after free in Windows SSDP Service allows an authorized attacker to elevate privileges locally.
FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability?
An attacker who successfully exploited this vulnerability coul
msrc
CVE-2025-47991HIGHCVSS 7.82025-07-08
CVE-2025-47991 [HIGH] CWE-416 Windows Input Method Editor (IME) Elevation of Privilege Vulnerability
Windows Input Method Editor (IME) Elevation of Privilege Vulnerability
Description: Use after free in Microsoft Input Method Editor (IME) allows an authorized attacker to elevate privileges locally.
FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?
Successful exploitation of this vulnerability requires an attacker to win a race
msrc
CVE-2025-47985HIGHCVSS 7.82025-07-08
CVE-2025-47985 [HIGH] CWE-822 Windows Event Tracing Elevation of Privilege Vulnerability
Windows Event Tracing Elevation of Privilege Vulnerability
Description: Untrusted pointer dereference in Windows Event Tracing allows an authorized attacker to elevate privileges locally.
FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability?
An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.
Windows Event Tracing: Windows Ev
msrc
CVE-2025-49727HIGHCVSS 7.02025-07-08
CVE-2025-49727 [HIGH] CWE-122 Win32k Elevation of Privilege Vulnerability
Win32k Elevation of Privilege Vulnerability
Description: Heap-based buffer overflow in Windows Win32K - GRFX allows an authorized attacker to elevate privileges locally.
FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability?
An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.
Windows Win32K - GRFX: Windows Win32K - GRFX
Microsoft: Microsoft
msrc
CVE-2025-49733HIGHCVSS 7.82025-07-08
CVE-2025-49733 [HIGH] CWE-416 Win32k Elevation of Privilege Vulnerability
Win32k Elevation of Privilege Vulnerability
Description: Use after free in Windows Win32K - ICOMP allows an authorized attacker to elevate privileges locally.
FAQ: What privileges could be gained by an attacker who successfully exploited the vulnerability?
A local, authenticated attacker could gain elevated local system or administrator privileges through a vulnerability in the Win32k.sys driver.
Windows Win32K - ICOMP:
msrc
CVE-2025-49744HIGHCVSS 7.0PoC2025-07-08
CVE-2025-49744 [HIGH] CWE-122 Windows Graphics Component Elevation of Privilege Vulnerability
Windows Graphics Component Elevation of Privilege Vulnerability
Description: Heap-based buffer overflow in Microsoft Graphics Component allows an authorized attacker to elevate privileges locally.
FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?
To successfully exploit this vulnerability, an attacker would need to gain elevated privil
msrc
CVE-2025-49675HIGHCVSS 7.82025-07-08
CVE-2025-49675 [HIGH] CWE-416 Kernel Streaming WOW Thunk Service Driver Elevation of Privilege Vulnerability
Kernel Streaming WOW Thunk Service Driver Elevation of Privilege Vulnerability
Description: Use after free in Kernel Streaming WOW Thunk Service Driver allows an authorized attacker to elevate privileges locally.
FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability?
An attacker who successfully exploited this vulnerability could gain SYSTEM p
msrc
CVE-2025-47986HIGHCVSS 8.82025-07-08
CVE-2025-47986 [HIGH] CWE-416 Universal Print Management Service Elevation of Privilege Vulnerability
Universal Print Management Service Elevation of Privilege Vulnerability
Description: Use after free in Universal Print Management Service allows an authorized attacker to elevate privileges locally.
FAQ: According to the CVSS metric, a successful exploitation could lead to a scope change (S:C). What does this mean for this vulnerability?
This vulnerability could lead to a contained execution e
msrc