Msrc Windows 11 Version 23H2 vulnerabilities
1,148 known vulnerabilities affecting msrc/windows_11_version_23h2.
Total CVEs
1,148
CISA KEV
51
actively exploited
Public exploits
21
Exploited in wild
25
Severity breakdown
CRITICAL14HIGH805MEDIUM322LOW7
Vulnerabilities
Page 2 of 58
CVE-2026-25188HIGHCVSS 8.82026-03-10
CVE-2026-25188 [HIGH] CWE-122 Windows Telephony Service Elevation of Privilege Vulnerability
Windows Telephony Service Elevation of Privilege Vulnerability
Description: Heap-based buffer overflow in Windows Telephony Service allows an unauthorized attacker to elevate privileges over an adjacent network.
FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability?
An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.
FAQ:
msrc
CVE-2026-25173HIGHCVSS 8.02026-03-10
CVE-2026-25173 [HIGH] CWE-190 Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
Description: Integer overflow or wraparound in Windows Routing and Remote Access Service (RRAS) allows an authorized attacker to execute code over a network.
FAQ: How could an attacker exploit this vulnerability?
An attacker authenticated on the domain could exploit this vulnerability by tricking
msrc
CVE-2026-24292HIGHCVSS 7.82026-03-10
CVE-2026-24292 [HIGH] CWE-416 Windows Connected Devices Platform Service Elevation of Privilege Vulnerability
Windows Connected Devices Platform Service Elevation of Privilege Vulnerability
Description: Use after free in Connected Devices Platform Service (Cdpsvc) allows an authorized attacker to elevate privileges locally.
FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability?
An attacker who successfully exploited this vulnerability could gain SYST
msrc
CVE-2026-25187HIGHCVSS 7.82026-03-10
CVE-2026-25187 [HIGH] CWE-59 Winlogon Elevation of Privilege Vulnerability
Winlogon Elevation of Privilege Vulnerability
Description: Improper link resolution before file access ('link following') in Winlogon allows an authorized attacker to elevate privileges locally.
FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability?
An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.
Winlogon: Winlogon
Microsoft: Microsoft
msrc
CVE-2026-25190HIGHCVSS 7.82026-03-10
CVE-2026-25190 [HIGH] CWE-426 GDI Remote Code Execution Vulnerability
GDI Remote Code Execution Vulnerability
Description: Untrusted search path in Windows GDI allows an unauthorized attacker to execute code locally.
FAQ: According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution?
The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Executio
msrc
CVE-2026-23674HIGHCVSS 7.52026-03-10
CVE-2026-23674 [HIGH] CWE-41 MapUrlToZone Security Feature Bypass Vulnerability
MapUrlToZone Security Feature Bypass Vulnerability
Description: Improper resolution of path equivalence in Windows MapUrlToZone allows an unauthorized attacker to bypass a security feature over a network.
FAQ: What kind of security feature could be bypassed by successfully exploiting this vulnerability?
An attacker who successfully exploited the vulnerability could bypass the MapURLToZone method.
FAQ: The Security
msrc
CVE-2026-25178HIGHCVSS 7.02026-03-10
CVE-2026-25178 [HIGH] CWE-416 Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
Description: Use after free in Windows Ancillary Function Driver for WinSock allows an authorized attacker to elevate privileges locally.
FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability?
An attacker who successfully exploited this vulnerability could g
msrc
CVE-2026-25165HIGHCVSS 7.82026-03-10
CVE-2026-25165 [HIGH] CWE-476 Performance Counters for Windows Elevation of Privilege Vulnerability
Performance Counters for Windows Elevation of Privilege Vulnerability
Description: Null pointer dereference in Windows Performance Counters allows an authorized attacker to elevate privileges locally.
FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability?
An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.
Windows P
msrc
CVE-2026-25172HIGHCVSS 8.02026-03-10
CVE-2026-25172 [HIGH] CWE-190 Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
Description: Integer overflow or wraparound in Windows Routing and Remote Access Service (RRAS) allows an authorized attacker to execute code over a network.
FAQ: How could an attacker exploit this vulnerability?
An attacker authenticated on the domain could exploit this vulnerability by tricking
msrc
CVE-2026-25177HIGHCVSS 8.82026-03-10
CVE-2026-25177 [HIGH] CWE-641 Active Directory Domain Services Elevation of Privilege Vulnerability
Active Directory Domain Services Elevation of Privilege Vulnerability
Description: Improper restriction of names for files and other resources in Active Directory Domain Services allows an authorized attacker to elevate privileges over a network.
FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability?
An attacker who successfully exploited this vulnerab
msrc
CVE-2026-23669HIGHCVSS 8.82026-03-10
CVE-2026-23669 [HIGH] CWE-416 RPC Runtime Library Remote Code Execution Vulnerability
RPC Runtime Library Remote Code Execution Vulnerability
Description: Use after free in RPC Runtime allows an authorized attacker to execute code over a network.
FAQ: How could an attacker exploit this vulnerability?
An attacker could exploit this vulnerability by sending specially crafted network responses to a system running the Windows Print Spooler service. These malformed responses may cause the service t
msrc
CVE-2026-25185MEDIUMCVSS 5.32026-03-10
CVE-2026-25185 [MEDIUM] CWE-200 Windows Shell Link Processing Spoofing Vulnerability
Windows Shell Link Processing Spoofing Vulnerability
Description: Exposure of sensitive information to an unauthorized actor in Windows Shell Link Processing allows an unauthorized attacker to perform spoofing over a network.
FAQ: According to the CVSS metrics, successful exploitation of this vulnerability could lead to some loss of confidentiality (C:L),but lead to no loss of availability (A:N) and integrity
msrc
CVE-2026-25169MEDIUMCVSS 6.22026-03-10
CVE-2026-25169 [MEDIUM] CWE-369 Windows Graphics Component Denial of Service Vulnerability
Windows Graphics Component Denial of Service Vulnerability
Description: Divide by zero in Microsoft Graphics Component allows an unauthorized attacker to deny service locally.
Microsoft Graphics Component: Microsoft Graphics Component
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Denial of Service
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Les
msrc
CVE-2026-25180MEDIUMCVSS 5.52026-03-10
CVE-2026-25180 [MEDIUM] CWE-125 Windows Graphics Component Information Disclosure Vulnerability
Windows Graphics Component Information Disclosure Vulnerability
Description: Out-of-bounds read in Microsoft Graphics Component allows an unauthorized attacker to disclose information locally.
FAQ: According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?
A user would need to be tricked into opening a folder that contains a specially crafted file.
msrc
CVE-2026-25168MEDIUMCVSS 6.22026-03-10
CVE-2026-25168 [MEDIUM] CWE-476 Windows Graphics Component Denial of Service Vulnerability
Windows Graphics Component Denial of Service Vulnerability
Description: Null pointer dereference in Microsoft Graphics Component allows an unauthorized attacker to deny service locally.
Microsoft Graphics Component: Microsoft Graphics Component
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Denial of Service
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploi
msrc
CVE-2026-25186MEDIUMCVSS 5.52026-03-10
CVE-2026-25186 [MEDIUM] CWE-200 Windows Accessibility Infrastructure (ATBroker.exe) Information Disclosure Vulnerability
Windows Accessibility Infrastructure (ATBroker.exe) Information Disclosure Vulnerability
Description: Exposure of sensitive information to an unauthorized actor in Windows Accessibility Infrastructure (ATBroker.exe) allows an authorized attacker to disclose information locally.
FAQ: What type of information could be disclosed by this vulnerability?
The type of information th
msrc
CVE-2026-21248HIGHCVSS 7.32026-02-10
CVE-2026-21248 [HIGH] CWE-122 Windows Hyper-V Remote Code Execution Vulnerability
Windows Hyper-V Remote Code Execution Vulnerability
Description: Heap-based buffer overflow in Windows Hyper-V allows an authorized attacker to execute code locally.
FAQ: According to the CVSS metric, user interaction is required (UI:R) and privileges required is Low (PR:L). What does that mean for this vulnerability?
The file must be stored in a location that allows an attacker write access, enabling the file to
msrc
CVE-2026-21255HIGHCVSS 8.82026-02-10
CVE-2026-21255 [HIGH] CWE-284 Windows Hyper-V Security Feature Bypass Vulnerability
Windows Hyper-V Security Feature Bypass Vulnerability
Description: Improper access control in Windows Hyper-V allows an authorized attacker to bypass a security feature locally.
FAQ: What kind of security feature could be bypassed by successfully exploiting this vulnerability?
An attacker who successfully exploited this vulnerability could bypass the Virtualization-based Security feature.
FAQ: How could an att
msrc
CVE-2026-21508HIGHCVSS 7.02026-02-10
CVE-2026-21508 [HIGH] CWE-287 Windows Storage Elevation of Privilege Vulnerability
Windows Storage Elevation of Privilege Vulnerability
Description: Improper authentication in Windows Storage allows an authorized attacker to elevate privileges locally.
FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?
Successful exploitation of this vulnerability requires an attacker to prepare the target environment to improve exploit reliabil
msrc
CVE-2026-20846HIGHCVSS 7.52026-02-10
CVE-2026-20846 [HIGH] CWE-126 GDI+ Denial of Service Vulnerability
GDI+ Denial of Service Vulnerability
Description: Buffer over-read in Windows GDI+ allows an unauthorized attacker to deny service over a network.
Windows GDI+: Windows GDI+
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Denial of Service
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely
Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB507
msrc