Msrc Windows 11 Version 23H2 For X64-Based Systems vulnerabilities
273 known vulnerabilities affecting msrc/windows_11_version_23h2_for_x64-based_systems.
Total CVEs
273
CISA KEV
8
actively exploited
Public exploits
4
Exploited in wild
5
Severity breakdown
CRITICAL1HIGH169MEDIUM102LOW1
Vulnerabilities
Page 1 of 14
CVE-2026-26132HIGHCVSS 7.82026-03-10
CVE-2026-26132 [HIGH] CWE-416 Windows Kernel Elevation of Privilege Vulnerability
Windows Kernel Elevation of Privilege Vulnerability
Description: Use after free in Windows Kernel allows an authorized attacker to elevate privileges locally.
FAQ: What privileges could be gained by an attacker who successfully exploited the vulnerability?
An attacker who successfully exploited this vulnerability could gain administrator privileges.
Windows Kernel: Windows Kernel
Microsoft: Microsoft
Customer
msrc
CVE-2026-23667HIGHCVSS 7.02026-03-10
CVE-2026-23667 [HIGH] CWE-416 Broadcast DVR Elevation of Privilege Vulnerability
Broadcast DVR Elevation of Privilege Vulnerability
Description: Use after free in Broadcast DVR allows an authorized attacker to elevate privileges locally.
FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability?
An attacker who successfully exploited this vulnerability could elevate from a low integrity level up to a medium integrity level.
FAQ: According to the CVSS me
msrc
CVE-2026-25170HIGHCVSS 7.02026-03-10
CVE-2026-25170 [HIGH] CWE-416 Windows Hyper-V Elevation of Privilege Vulnerability
Windows Hyper-V Elevation of Privilege Vulnerability
Description: Use after free in Windows Hyper-V allows an authorized attacker to elevate privileges locally.
FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability?
An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.
FAQ: According to the CVSS metric, the attack complexity is high (
msrc
CVE-2026-24293HIGHCVSS 7.82026-03-10
CVE-2026-24293 [HIGH] CWE-476 Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
Description: Null pointer dereference in Windows Ancillary Function Driver for WinSock allows an authorized attacker to elevate privileges locally.
FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability?
An attacker who successfully exploited this vulnerabili
msrc
CVE-2026-24282MEDIUMCVSS 5.52026-03-10
CVE-2026-24282 [MEDIUM] CWE-125 Push message Routing Service Elevation of Privilege Vulnerability
Push message Routing Service Elevation of Privilege Vulnerability
Description: Out-of-bounds read in Push Message Routing Service allows an authorized attacker to disclose information locally.
FAQ: What type of information could be disclosed by this vulnerability?
An attacker who successfully exploited this vulnerability could potentially read portions of heap memory.
Push Message Routing Service
msrc
CVE-2026-21237HIGHCVSS 7.02026-02-10
CVE-2026-21237 [HIGH] CWE-362 Windows Subsystem for Linux Elevation of Privilege Vulnerability
Windows Subsystem for Linux Elevation of Privilege Vulnerability
Description: Concurrent execution using shared resource with improper synchronization ('race condition') in Windows Subsystem for Linux allows an authorized attacker to elevate privileges locally.
FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?
For an attacker to explo
msrc
CVE-2026-21241HIGHCVSS 7.02026-02-10
CVE-2026-21241 [HIGH] CWE-416 Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
Description: Use after free in Windows Ancillary Function Driver for WinSock allows an authorized attacker to elevate privileges locally.
FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?
For an attacker to exploit this vulnerability,
msrc
CVE-2026-21242HIGHCVSS 7.02026-02-10
CVE-2026-21242 [HIGH] CWE-416 Windows Subsystem for Linux Elevation of Privilege Vulnerability
Windows Subsystem for Linux Elevation of Privilege Vulnerability
Description: Use after free in Windows Subsystem for Linux allows an authorized attacker to elevate privileges locally.
FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability?
An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.
FAQ: According to the CVSS met
msrc
CVE-2026-21232HIGHCVSS 7.82026-02-10
CVE-2026-21232 [HIGH] CWE-822 Windows HTTP.sys Elevation of Privilege Vulnerability
Windows HTTP.sys Elevation of Privilege Vulnerability
Description: Untrusted pointer dereference in Windows HTTP.sys allows an authorized attacker to elevate privileges locally.
FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability?
An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.
Windows HTTP.sys: Windows HTTP.sys
Microsoft: M
msrc
CVE-2026-20920HIGHCVSS 7.82026-01-13
CVE-2026-20920 [HIGH] CWE-416 Win32k Elevation of Privilege Vulnerability
Win32k Elevation of Privilege Vulnerability
Description: Use after free in Windows Win32K - ICOMP allows an authorized attacker to elevate privileges locally.
FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability?
An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.
Windows Win32K - ICOMP: Windows Win32K - ICOMP
Microsoft: Microsoft
Custome
msrc
CVE-2026-20842HIGHCVSS 7.02026-01-13
CVE-2026-20842 [HIGH] CWE-416 Microsoft DWM Core Library Elevation of Privilege Vulnerability
Microsoft DWM Core Library Elevation of Privilege Vulnerability
Description: Use after free in Windows DWM allows an authorized attacker to elevate privileges locally.
FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?
For an attacker to exploit this vulnerability, they would need to have knowledge of a specific operation that triggers
msrc
CVE-2026-20871HIGHCVSS 7.82026-01-13
CVE-2026-20871 [HIGH] CWE-416 Desktop Window Manager Elevation of Privilege Vulnerability
Desktop Window Manager Elevation of Privilege Vulnerability
Description: Use after free in Desktop Windows Manager allows an authorized attacker to elevate privileges locally.
FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability?
An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.
Desktop Window Manager: Desktop Window Manag
msrc
CVE-2026-20817HIGHCVSS 7.82026-01-13
CVE-2026-20817 [HIGH] CWE-280 Windows Error Reporting Service Elevation of Privilege Vulnerability
Windows Error Reporting Service Elevation of Privilege Vulnerability
Description: Improper handling of insufficient permissions or privileges in Windows Error Reporting allows an authorized attacker to elevate privileges locally.
FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability?
An attacker who successfully exploited this vulnerability could gain S
msrc
CVE-2026-20811HIGHCVSS 7.82026-01-13
CVE-2026-20811 [HIGH] CWE-843 Win32k Elevation of Privilege Vulnerability
Win32k Elevation of Privilege Vulnerability
Description: Access of resource using incompatible type ('type confusion') in Windows Win32K - ICOMP allows an authorized attacker to elevate privileges locally.
FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability?
An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.
Windows Win32K - ICOMP: Window
msrc
CVE-2026-20938HIGHCVSS 7.82026-01-13
CVE-2026-20938 [HIGH] CWE-822 Windows Virtualization-Based Security (VBS) Enclave Elevation of Privilege Vulnerability
Windows Virtualization-Based Security (VBS) Enclave Elevation of Privilege Vulnerability
Description: Untrusted pointer dereference in Windows Virtualization-Based Security (VBS) Enclave allows an authorized attacker to elevate privileges locally.
FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability?
An attacker who successfully exp
msrc
CVE-2026-20853HIGHCVSS 7.42026-01-13
CVE-2026-20853 [HIGH] CWE-362 Windows WalletService Elevation of Privilege Vulnerability
Windows WalletService Elevation of Privilege Vulnerability
Description: Concurrent execution using shared resource with improper synchronization ('race condition') in Windows WalletService allows an unauthorized attacker to elevate privileges locally.
FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?
Successful exploitation of this vulnerab
msrc
CVE-2026-20863HIGHCVSS 7.02026-01-13
CVE-2026-20863 [HIGH] CWE-415 Win32k Elevation of Privilege Vulnerability
Win32k Elevation of Privilege Vulnerability
Description: Double free in Windows Win32K - ICOMP allows an authorized attacker to elevate privileges locally.
FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?
Successful exploitation of this vulnerability requires an attacker to win a race condition.
FAQ: What privileges could be gained by an attacker who su
msrc
CVE-2026-20935MEDIUMCVSS 6.22026-01-13
CVE-2026-20935 [MEDIUM] CWE-822 Windows Virtualization-Based Security (VBS) Information Disclosure Vulnerability
Windows Virtualization-Based Security (VBS) Information Disclosure Vulnerability
Description: Untrusted pointer dereference in Windows Virtualization-Based Security (VBS) Enclave allows an unauthorized attacker to disclose information locally.
FAQ: What type of information could be disclosed by this vulnerability?
An attacker who successfully exploited this vulnerability could view
msrc
CVE-2026-20825MEDIUMCVSS 4.42026-01-13
CVE-2026-20825 [MEDIUM] CWE-284 Windows Hyper-V Information Disclosure Vulnerability
Windows Hyper-V Information Disclosure Vulnerability
Description: Improper access control in Windows Hyper-V allows an authorized attacker to disclose information locally.
FAQ: What type of information could be disclosed by this vulnerability?
The type of information that could be disclosed if an attacker successfully exploited this vulnerability is Guest VM to Hyper-V host server - virtualization security bou
msrc
CVE-2026-20838MEDIUMCVSS 5.52026-01-13
CVE-2026-20838 [MEDIUM] CWE-209 Windows Kernel Information Disclosure Vulnerability
Windows Kernel Information Disclosure Vulnerability
Description: Generation of error message containing sensitive information in Windows Kernel allows an authorized attacker to disclose information locally.
FAQ: What type of information could be disclosed by this vulnerability?
The type of information that could be disclosed if an attacker successfully exploited this vulnerability is Kernel memory read - uninte
msrc
1 / 14Next →