Msrc Windows 11 Version 23H2 vulnerabilities

1,148 known vulnerabilities affecting msrc/windows_11_version_23h2.

Total CVEs
1,148
CISA KEV
51
actively exploited
Public exploits
21
Exploited in wild
25
Severity breakdown
CRITICAL14HIGH805MEDIUM322LOW7

Vulnerabilities

Page 3 of 58
CVE-2026-21240HIGHCVSS 7.82026-02-10
CVE-2026-21240 [HIGH] CWE-367 Windows HTTP.sys Elevation of Privilege Vulnerability Windows HTTP.sys Elevation of Privilege Vulnerability Description: Time-of-check time-of-use (toctou) race condition in Windows HTTP.sys allows an authorized attacker to elevate privileges locally. FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. Windows HTTP.sys: Windows HT
msrc
CVE-2026-21239HIGHCVSS 7.82026-02-10
CVE-2026-21239 [HIGH] CWE-122 Windows Kernel Elevation of Privilege Vulnerability Windows Kernel Elevation of Privilege Vulnerability Description: Heap-based buffer overflow in Windows Kernel allows an authorized attacker to elevate privileges locally. FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. Windows Kernel: Windows Kernel Microsoft: Microsoft Cus
msrc
CVE-2026-21235HIGHCVSS 7.32026-02-10
CVE-2026-21235 [HIGH] CWE-416 Windows Graphics Component Elevation of Privilege Vulnerability Windows Graphics Component Elevation of Privilege Vulnerability Description: Use after free in Microsoft Graphics Component allows an authorized attacker to elevate privileges locally. FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. FAQ: According to the CVSS metr
msrc
CVE-2026-21247HIGHCVSS 7.32026-02-10
CVE-2026-21247 [HIGH] CWE-20 Windows Hyper-V Remote Code Execution Vulnerability Windows Hyper-V Remote Code Execution Vulnerability Description: Improper input validation in Windows Hyper-V allows an authorized attacker to execute code locally. FAQ: According to the CVSS metric, user interaction is required (UI:R) and privileges required is Low (PR:L). What does that mean for this vulnerability? The file must be stored in a location that allows an attacker write access, enabling the file to b
msrc
CVE-2026-21519HIGHCVSS 7.8KEV2026-02-10
CVE-2026-21519 [HIGH] CWE-843 Desktop Window Manager Elevation of Privilege Vulnerability Desktop Window Manager Elevation of Privilege Vulnerability Description: Access of resource using incompatible type ('type confusion') in Desktop Window Manager allows an authorized attacker to elevate privileges locally. FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.
msrc
CVE-2026-21231HIGHCVSS 7.82026-02-10
CVE-2026-21231 [HIGH] CWE-362 Windows Kernel Elevation of Privilege Vulnerability Windows Kernel Elevation of Privilege Vulnerability Description: Concurrent execution using shared resource with improper synchronization ('race condition') in Windows Kernel allows an authorized attacker to elevate privileges locally. FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability? Successful exploitation of this vulnerability requires an attac
msrc
CVE-2026-21253HIGHCVSS 7.02026-02-10
CVE-2026-21253 [HIGH] CWE-416 Mailslot File System Elevation of Privilege Vulnerability Mailslot File System Elevation of Privilege Vulnerability Description: Use after free in Mailslot File System allows an authorized attacker to elevate privileges locally. FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability? Successful exploitation of this vulnerability requires an attacker to win a race condition. FAQ: What privileges could be
msrc
CVE-2026-21244HIGHCVSS 7.32026-02-10
CVE-2026-21244 [HIGH] CWE-122 Windows Hyper-V Remote Code Execution Vulnerability Windows Hyper-V Remote Code Execution Vulnerability Description: Heap-based buffer overflow in Windows Hyper-V allows an authorized attacker to execute code locally. FAQ: According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution? The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referre
msrc
CVE-2026-21238HIGHCVSS 7.82026-02-10
CVE-2026-21238 [HIGH] CWE-284 Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability Description: Improper access control in Windows Ancillary Function Driver for WinSock allows an authorized attacker to elevate privileges locally. FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerabilit
msrc
CVE-2026-21246HIGHCVSS 7.82026-02-10
CVE-2026-21246 [HIGH] CWE-122 Windows Graphics Component Elevation of Privilege Vulnerability Windows Graphics Component Elevation of Privilege Vulnerability Description: Heap-based buffer overflow in Microsoft Graphics Component allows an authorized attacker to elevate privileges locally. FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. Microsoft Graphics
msrc
CVE-2026-21236HIGHCVSS 7.82026-02-10
CVE-2026-21236 [HIGH] CWE-122 Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability Description: Heap-based buffer overflow in Windows Ancillary Function Driver for WinSock allows an authorized attacker to elevate privileges locally. FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerabi
msrc
CVE-2026-21510HIGHCVSS 8.8KEV2026-02-10
CVE-2026-21510 [HIGH] CWE-693 Windows Shell Security Feature Bypass Vulnerability Windows Shell Security Feature Bypass Vulnerability Description: Protection mechanism failure in Windows Shell allows an unauthorized attacker to bypass a security feature over a network. FAQ: According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do? To successfully exploit this vulnerability, an attacker must convince a user to open a malicious link or shortcu
msrc
CVE-2026-21513HIGHCVSS 8.8KEV2026-02-10
CVE-2026-21513 [HIGH] CWE-693 MSHTML Framework Security Feature Bypass Vulnerability MSHTML Framework Security Feature Bypass Vulnerability Description: Protection mechanism failure in MSHTML Framework allows an unauthorized attacker to bypass a security feature over a network. FAQ: According to the CVSS metric, the attack vector is user interaction is required (UI:R). How could an attacker exploit this security feature bypass vulnerability? An attacker could exploit this vulnerability by conv
msrc
CVE-2026-21533HIGHCVSS 7.8KEV2026-02-10
CVE-2026-21533 [HIGH] CWE-269 Windows Remote Desktop Services Elevation of Privilege Vulnerability Windows Remote Desktop Services Elevation of Privilege Vulnerability Description: Improper privilege management in Windows Remote Desktop allows an authorized attacker to elevate privileges locally. FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. Windows Remo
msrc
CVE-2026-21234HIGHCVSS 7.02026-02-10
CVE-2026-21234 [HIGH] CWE-362 Windows Connected Devices Platform Service Elevation of Privilege Vulnerability Windows Connected Devices Platform Service Elevation of Privilege Vulnerability Description: Concurrent execution using shared resource with improper synchronization ('race condition') in Windows Connected Devices Platform Service allows an authorized attacker to elevate privileges locally. FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for
msrc
CVE-2026-21222MEDIUMCVSS 5.52026-02-10
CVE-2026-21222 [MEDIUM] CWE-532 Windows Kernel Information Disclosure Vulnerability Windows Kernel Information Disclosure Vulnerability Description: Insertion of sensitive information into log file in Windows Kernel allows an authorized attacker to disclose information locally. FAQ: What type of information could be disclosed by this vulnerability? The type of information that could be disclosed if an attacker successfully exploited this vulnerability is Kernel memory read - unintentional read
msrc
CVE-2026-21525MEDIUMCVSS 6.2KEV2026-02-10
CVE-2026-21525 [MEDIUM] CWE-476 Windows Remote Access Connection Manager Denial of Service Vulnerability Windows Remote Access Connection Manager Denial of Service Vulnerability Description: Null pointer dereference in Windows Remote Access Connection Manager allows an unauthorized attacker to deny service locally. Windows Remote Access Connection Manager: Windows Remote Access Connection Manager Microsoft: Microsoft Customer Action Required: Yes Impact: Denial of Service Exploit Status: P
msrc
CVE-2026-21249LOWCVSS 3.32026-02-10
CVE-2026-21249 [LOW] CWE-73 Windows NTLM Spoofing Vulnerability Windows NTLM Spoofing Vulnerability Description: External control of file name or path in Windows NTLM allows an unauthorized attacker to perform spoofing locally. FAQ: According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do? An attacker must send a user a malicious Office file and convince them to open it. FAQ: According to the CVSS metrics, successful exploitation of this vu
msrc
CVE-2026-20929HIGHCVSS 7.52026-01-13
CVE-2026-20929 [HIGH] CWE-284 Windows HTTP.sys Elevation of Privilege Vulnerability Windows HTTP.sys Elevation of Privilege Vulnerability Description: Improper access control in Windows HTTP.sys allows an authorized attacker to elevate privileges over a network. FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability? The Attack requires an Service Principal Name (SPN) that is registered to an account that no longer exists or is not i
msrc
CVE-2026-20931HIGHCVSS 8.02026-01-13
CVE-2026-20931 [HIGH] CWE-73 Windows Telephony Service Elevation of Privilege Vulnerability Windows Telephony Service Elevation of Privilege Vulnerability Description: External control of file name or path in Windows Telephony Service allows an authorized attacker to elevate privileges over an adjacent network. FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges
msrc