Msrc Windows 11 Version 24H2 vulnerabilities

845 known vulnerabilities affecting msrc/windows_11_version_24h2.

Total CVEs
845
CISA KEV
40
actively exploited
Public exploits
17
Exploited in wild
14
Severity breakdown
CRITICAL11HIGH588MEDIUM241LOW5

Vulnerabilities

Page 14 of 43
CVE-2025-54116HIGHCVSS 7.32025-09-09
CVE-2025-54116 [HIGH] CWE-284 Windows MultiPoint Services Elevation of Privilege Vulnerability Windows MultiPoint Services Elevation of Privilege Vulnerability Description: Improper access control in Windows MultiPoint Services allows an authorized attacker to elevate privileges locally. FAQ: What privileges could be gained by an attacker who successfully exploited the vulnerability? An attacker would be able to delete any system files. FAQ: According to the CVSS metric, user interaction is r
msrc
CVE-2025-55234HIGHCVSS 8.82025-09-09
CVE-2025-55234 [HIGH] CWE-287 Windows SMB Elevation of Privilege Vulnerability Windows SMB Elevation of Privilege Vulnerability Description: SMB Server might be susceptible to relay attacks depending on the configuration. An attacker who successfully exploited these vulnerabilities could perform relay attacks and make the users subject to elevation of privilege attacks. The SMB Server already supports mechanisms for hardening against relay attacks: SMB Server signing SMB Server Extended Protec
msrc
CVE-2025-55223HIGHCVSS 7.02025-09-09
CVE-2025-55223 [HIGH] CWE-362 DirectX Graphics Kernel Elevation of Privilege Vulnerability DirectX Graphics Kernel Elevation of Privilege Vulnerability Description: Concurrent execution using shared resource with improper synchronization ('race condition') in Graphics Kernel allows an authorized attacker to elevate privileges locally. FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability? Successful exploitation of this vulnerabilit
msrc
CVE-2025-49734HIGHCVSS 7.02025-09-09
CVE-2025-49734 [HIGH] CWE-923 PowerShell Direct Elevation of Privilege Vulnerability PowerShell Direct Elevation of Privilege Vulnerability Description: Improper restriction of communication channel to intended endpoints in Windows PowerShell allows an authorized attacker to elevate privileges locally. FAQ: What privileges could be gained by an attacker who successfully exploited the vulnerability? The attacker, initially a non-admin user on the host, could hijack the PowerShell Direct session
msrc
CVE-2025-55236HIGHCVSS 7.32025-09-09
CVE-2025-55236 [HIGH] CWE-367 Graphics Kernel Remote Code Execution Vulnerability Graphics Kernel Remote Code Execution Vulnerability Description: Time-of-check time-of-use (toctou) race condition in Graphics Kernel allows an authorized attacker to execute code locally. FAQ: According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution? The word Remote in the title refers to the location of the attacker. This type of explo
msrc
CVE-2025-54916HIGHCVSS 7.82025-09-09
CVE-2025-54916 [HIGH] CWE-121 Windows NTFS Remote Code Execution Vulnerability Windows NTFS Remote Code Execution Vulnerability Description: Stack-based buffer overflow in Windows NTFS allows an authorized attacker to execute code locally. FAQ: According to the CVSS metric, privileges required is low (PR:L). What does that mean for this vulnerability? Any authenticated attacker could trigger this vulnerability. It does not require admin or other elevated privileges. FAQ: According to the CVSS
msrc
CVE-2025-54093HIGHCVSS 7.02025-09-09
CVE-2025-54093 [HIGH] CWE-367 Windows TCP/IP Driver Elevation of Privilege Vulnerability Windows TCP/IP Driver Elevation of Privilege Vulnerability Description: Time-of-check time-of-use (toctou) race condition in Windows TCP/IP allows an authorized attacker to elevate privileges locally. FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. FAQ: According to th
msrc
CVE-2025-54894HIGHCVSS 7.82025-09-09
CVE-2025-54894 [HIGH] CWE-122 Local Security Authority Subsystem Service Elevation of Privilege Vulnerability Local Security Authority Subsystem Service Elevation of Privilege Vulnerability FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. Windows Local Security Authority Subsystem Service (LSASS): Windows Local Security Authority Subsystem Service (LSASS) M
msrc
CVE-2025-54111HIGHCVSS 7.82025-09-09
CVE-2025-54111 [HIGH] CWE-416 Windows UI XAML Phone DatePickerFlyout Elevation of Privilege Vulnerability Windows UI XAML Phone DatePickerFlyout Elevation of Privilege Vulnerability Description: Use after free in Windows UI XAML Phone DatePickerFlyout allows an authorized attacker to elevate privileges locally. FAQ: What privileges could be gained by an attacker who successfully exploited the vulnerability? An attacker who successfully exploited this vulnerability could potentially gain the ab
msrc
CVE-2025-54098HIGHCVSS 7.82025-09-09
CVE-2025-54098 [HIGH] CWE-284 Windows Hyper-V Elevation of Privilege Vulnerability Windows Hyper-V Elevation of Privilege Vulnerability Description: Improper access control in Windows Hyper-V allows an authorized attacker to elevate privileges locally. FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. Role: Windows Hyper-V: Role: Windows Hyper-V Microsoft:
msrc
CVE-2025-54112HIGHCVSS 7.02025-09-09
CVE-2025-54112 [HIGH] CWE-416 Microsoft Virtual Hard Disk Elevation of Privilege Vulnerability Microsoft Virtual Hard Disk Elevation of Privilege Vulnerability Description: Use after free in Microsoft Virtual Hard Drive allows an authorized attacker to elevate privileges locally. FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability? Successful exploitation of this vulnerability requires an attacker to win a race condition. FAQ: Wh
msrc
CVE-2025-54091HIGHCVSS 7.82025-09-09
CVE-2025-54091 [HIGH] CWE-190 Windows Hyper-V Elevation of Privilege Vulnerability Windows Hyper-V Elevation of Privilege Vulnerability Description: Integer overflow or wraparound in Windows Hyper-V allows an authorized attacker to elevate privileges locally. FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. Role: Windows Hyper-V: Role: Windows Hyper-V Micr
msrc
CVE-2025-54895HIGHCVSS 7.82025-09-09
CVE-2025-54895 [HIGH] CWE-190 SPNEGO Extended Negotiation (NEGOEX) Security Mechanism Elevation of Privilege Vulnerability SPNEGO Extended Negotiation (NEGOEX) Security Mechanism Elevation of Privilege Vulnerability Description: Integer overflow or wraparound in Windows SPNEGO Extended Negotiation allows an authorized attacker to elevate privileges locally. FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited
msrc
CVE-2025-53807HIGHCVSS 7.02025-09-09
CVE-2025-53807 [HIGH] CWE-362 Windows Graphics Component Elevation of Privilege Vulnerability Windows Graphics Component Elevation of Privilege Vulnerability Description: Concurrent execution using shared resource with improper synchronization ('race condition') in Microsoft Graphics Component allows an authorized attacker to elevate privileges locally. FAQ: What privileges could be gained by an attacker who successfully exploited the vulnerability? An attacker who successfully exploited this
msrc
CVE-2025-54102HIGHCVSS 7.82025-09-09
CVE-2025-54102 [HIGH] CWE-416 Windows Connected Devices Platform Service Elevation of Privilege Vulnerability Windows Connected Devices Platform Service Elevation of Privilege Vulnerability Description: Use after free in Windows Connected Devices Platform Service allows an authorized attacker to elevate privileges locally. FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTE
msrc
CVE-2025-54919HIGHCVSS 7.52025-09-09
CVE-2025-54919 [HIGH] CWE-362 Windows Graphics Component Remote Code Execution Vulnerability Windows Graphics Component Remote Code Execution Vulnerability Description: Concurrent execution using shared resource with improper synchronization ('race condition') in Windows Win32K - GRFX allows an authorized attacker to execute code locally. FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability? Successful exploitation of this vulnerab
msrc
CVE-2025-54114HIGHCVSS 7.02025-09-09
CVE-2025-54114 [HIGH] CWE-362 Windows Connected Devices Platform Service Elevation of Privilege Vulnerability Windows Connected Devices Platform Service Elevation of Privilege Vulnerability Description: Concurrent execution using shared resource with improper synchronization ('race condition') in Windows Connected Devices Platform Service allows an authorized attacker to elevate privileges locally. FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for
msrc
CVE-2025-54911HIGHCVSS 7.32025-09-09
CVE-2025-54911 [HIGH] CWE-416 Windows BitLocker Elevation of Privilege Vulnerability Windows BitLocker Elevation of Privilege Vulnerability Description: Use after free in Windows BitLocker allows an authorized attacker to elevate privileges locally. FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. FAQ: According to the CVSS metric, user interaction is requi
msrc
CVE-2025-54099HIGHCVSS 7.02025-09-09
CVE-2025-54099 [HIGH] CWE-121 Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability Description: Stack-based buffer overflow in Windows Ancillary Function Driver for WinSock allows an authorized attacker to elevate privileges locally. FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability? Successful exploitation of this vu
msrc
CVE-2025-54110HIGHCVSS 8.82025-09-09
CVE-2025-54110 [HIGH] CWE-190 Windows Kernel Elevation of Privilege Vulnerability Windows Kernel Elevation of Privilege Vulnerability Description: Integer overflow or wraparound in Windows Kernel allows an authorized attacker to elevate privileges locally. FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. FAQ: According to the CVSS metric, a successful explo
msrc