Msrc Windows 11 Version 22H2 vulnerabilities

1,469 known vulnerabilities affecting msrc/windows_11_version_22h2.

Total CVEs
1,469
CISA KEV
65
actively exploited
Public exploits
26
Exploited in wild
47
Severity breakdown
CRITICAL32HIGH1032MEDIUM398LOW7

Vulnerabilities

Page 29 of 74
CVE-2024-43626HIGHCVSS 7.82024-11-12
CVE-2024-43626 [HIGH] CWE-122 Windows Telephony Service Elevation of Privilege Vulnerability Windows Telephony Service Elevation of Privilege Vulnerability FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. Windows Telephony Service: Windows Telephony Service Microsoft: Microsoft Customer Action Required: Yes Impact: Elevation of Privilege Exploit Status:
msrc
CVE-2024-43623HIGHCVSS 7.82024-11-12
CVE-2024-43623 [HIGH] CWE-190 Windows NT OS Kernel Elevation of Privilege Vulnerability Windows NT OS Kernel Elevation of Privilege Vulnerability FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. Windows NT OS Kernel: Windows NT OS Kernel Microsoft: Microsoft Customer Action Required: Yes Impact: Elevation of Privilege Exploit Status: Publicly Disclosed:N
msrc
CVE-2024-43622HIGHCVSS 8.82024-11-12
CVE-2024-43622 [HIGH] CWE-122 Windows Telephony Service Remote Code Execution Vulnerability Windows Telephony Service Remote Code Execution Vulnerability FAQ: According to the CVSS metric, the attack vector is network (AV:N) and the user interaction is required (UI:R). What is the target context of the remote code execution? This attack requires a client to connect to a malicious server, and that could allow the attacker to gain code execution on the client. FAQ: How could an attacker exploit
msrc
CVE-2024-49046HIGHCVSS 7.82024-11-12
CVE-2024-49046 [HIGH] CWE-367 Windows Win32 Kernel Subsystem Elevation of Privilege Vulnerability Windows Win32 Kernel Subsystem Elevation of Privilege Vulnerability FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. Windows Win32 Kernel Subsystem: Windows Win32 Kernel Subsystem Microsoft: Microsoft Customer Action Required: Yes Impact: Elevation of Privile
msrc
CVE-2024-43628HIGHCVSS 8.82024-11-12
CVE-2024-43628 [HIGH] CWE-190 Windows Telephony Service Remote Code Execution Vulnerability Windows Telephony Service Remote Code Execution Vulnerability FAQ: According to the CVSS metric, the attack vector is network (AV:N) and the user interaction is required (UI:R). What is the target context of the remote code execution? This attack requires a client to connect to a malicious server, and that could allow the attacker to gain code execution on the client. FAQ: How could an attacker exploit
msrc
CVE-2024-43635HIGHCVSS 8.82024-11-12
CVE-2024-43635 [HIGH] CWE-190 Windows Telephony Service Remote Code Execution Vulnerability Windows Telephony Service Remote Code Execution Vulnerability FAQ: According to the CVSS metric, the attack vector is network (AV:N) and the user interaction is required (UI:R). What is the target context of the remote code execution? This attack requires a client to connect to a malicious server, and that could allow the attacker to gain code execution on the client. FAQ: How could an attacker exploit
msrc
CVE-2024-43636HIGHCVSS 7.82024-11-12
CVE-2024-43636 [HIGH] CWE-822 Win32k Elevation of Privilege Vulnerability Win32k Elevation of Privilege Vulnerability FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. Windows DWM Core Library: Windows DWM Core Library Microsoft: Microsoft Customer Action Required: Yes Impact: Elevation of Privilege Exploit Status: Publicly Disclosed:No;Exploited:No;Lates
msrc
CVE-2024-43452HIGHCVSS 7.52024-11-12
CVE-2024-43452 [HIGH] CWE-367 Windows Registry Elevation of Privilege Vulnerability Windows Registry Elevation of Privilege Vulnerability FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability? Successful exploitation of this vulnerability requires a
msrc
CVE-2024-43643MEDIUMCVSS 6.82024-11-12
CVE-2024-43643 [MEDIUM] CWE-125 Windows USB Video Class System Driver Elevation of Privilege Vulnerability Windows USB Video Class System Driver Elevation of Privilege Vulnerability FAQ: According to the CVSS metric, the attack vector is physical (AV:P). What does that mean for this vulnerability? To exploit this vulnerability, an unauthenticated attacker needs to physically connect a malicious USB device to the victim's machine. FAQ: What privileges could be gained by an attacker who successf
msrc
CVE-2024-43638MEDIUMCVSS 6.82024-11-12
CVE-2024-43638 [MEDIUM] CWE-125 Windows USB Video Class System Driver Elevation of Privilege Vulnerability Windows USB Video Class System Driver Elevation of Privilege Vulnerability FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. FAQ: According to the CVSS metric, the attack vector is physical (AV:P). What does that mean for this vulnerability? To exploit t
msrc
CVE-2024-38203MEDIUMCVSS 6.22024-11-12
CVE-2024-38203 [MEDIUM] CWE-693 Windows Package Library Manager Information Disclosure Vulnerability Windows Package Library Manager Information Disclosure Vulnerability FAQ: What type of information could be disclosed by this vulnerability? The type of information that could be disclosed if an attacker successfully exploited this vulnerability is secrets or privileged information belonging to the user of the affected application. Windows Package Library Manager: Windows Package Library Manage
msrc
CVE-2024-43637MEDIUMCVSS 6.82024-11-12
CVE-2024-43637 [MEDIUM] CWE-125 Windows USB Video Class System Driver Elevation of Privilege Vulnerability Windows USB Video Class System Driver Elevation of Privilege Vulnerability FAQ: According to the CVSS metric, the attack vector is physical (AV:P). What does that mean for this vulnerability? To exploit this vulnerability, an unauthenticated attacker needs to physically connect a malicious USB device to the victim's machine. FAQ: What privileges could be gained by an attacker who successf
msrc
CVE-2024-43451MEDIUMCVSS 6.5KEV2024-11-12
CVE-2024-43451 [MEDIUM] CWE-73 NTLM Hash Disclosure Spoofing Vulnerability NTLM Hash Disclosure Spoofing Vulnerability FAQ: According to the CVSS metric, successful exploitation of this vulnerability could lead to total loss of confidentiality (C:H)? What does that mean for this vulnerability? This vulnerability discloses a user's NTLMv2 hash to the attacker who could use this to authenticate as the user. FAQ: According to the CVSS metric, user interaction is required (UI:R). What interaction
msrc
CVE-2024-43449MEDIUMCVSS 6.82024-11-12
CVE-2024-43449 [MEDIUM] CWE-125 Windows USB Video Class System Driver Elevation of Privilege Vulnerability Windows USB Video Class System Driver Elevation of Privilege Vulnerability FAQ: According to the CVSS metric, the attack vector is physical (AV:P). What does that mean for this vulnerability? To exploit this vulnerability, an unauthenticated attacker needs to physically connect a malicious USB device to the victim's machine. FAQ: What privileges could be gained by an attacker who successf
msrc
CVE-2024-43634MEDIUMCVSS 6.82024-11-12
CVE-2024-43634 [MEDIUM] CWE-125 Windows USB Video Class System Driver Elevation of Privilege Vulnerability Windows USB Video Class System Driver Elevation of Privilege Vulnerability FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. FAQ: According to the CVSS metric, the attack vector is physical (AV:P). What does that mean for this vulnerability? To exploit t
msrc
CVE-2024-43646MEDIUMCVSS 6.72024-11-12
CVE-2024-43646 [MEDIUM] CWE-822 Windows Secure Kernel Mode Elevation of Privilege Vulnerability Windows Secure Kernel Mode Elevation of Privilege Vulnerability FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. Windows Secure Kernel Mode: Windows Secure Kernel Mode Microsoft: Microsoft Customer Action Required: Yes Impact: Elevation of Privilege Exploit St
msrc
CVE-2024-43517HIGHCVSS 8.82024-10-08
CVE-2024-43517 [HIGH] CWE-122 Microsoft ActiveX Data Objects Remote Code Execution Vulnerability Microsoft ActiveX Data Objects Remote Code Execution Vulnerability FAQ: According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do? An attacker must send the user a malicious file and convince them to open it. FAQ: According to the CVSS metric, the attack vector is network (AV:N) and the user interaction is required (UI:R). What is the target conte
msrc
CVE-2024-43581HIGHCVSS 7.12024-10-08
CVE-2024-43581 [HIGH] CWE-73 Microsoft OpenSSH for Windows Remote Code Execution Vulnerability Microsoft OpenSSH for Windows Remote Code Execution Vulnerability FAQ: According to the CVSS metric, privileges required is low (PR:L). What does that mean for this vulnerability? Successful exploitation of this vulnerability requires an attacker to have access to the location where the target file will be run. They would then need to plant a specific file that would be used as part of the exploitatio
msrc
CVE-2024-43506HIGHCVSS 7.52024-10-08
CVE-2024-43506 [HIGH] CWE-400 BranchCache Denial of Service Vulnerability BranchCache Denial of Service Vulnerability BranchCache: BranchCache Microsoft: Microsoft Customer Action Required: Yes Impact: Denial of Service Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5044277 Reference: https://support.microsoft.com/help/5044277 Reference: https://catalog.update.micr
msrc
CVE-2024-43599HIGHCVSS 8.82024-10-08
CVE-2024-43599 [HIGH] CWE-416 Remote Desktop Client Remote Code Execution Vulnerability Remote Desktop Client Remote Code Execution Vulnerability FAQ: How could an attacker exploit this vulnerability? In the case of a Remote Desktop connection, an attacker with control of a Remote Desktop Server could trigger a remote code execution (RCE) on the RDP client machine when a victim connects to the attacking server with the vulnerable Remote Desktop Client. Remote Desktop Client: Remote Desktop Cli
msrc