Msrc Windows 11 Version 24H2 vulnerabilities

845 known vulnerabilities affecting msrc/windows_11_version_24h2.

Total CVEs
845
CISA KEV
40
actively exploited
Public exploits
17
Exploited in wild
14
Severity breakdown
CRITICAL11HIGH588MEDIUM241LOW5

Vulnerabilities

Page 18 of 43
CVE-2025-47982HIGHCVSS 7.82025-07-08
CVE-2025-47982 [HIGH] CWE-20 Windows Storage VSP Driver Elevation of Privilege Vulnerability Windows Storage VSP Driver Elevation of Privilege Vulnerability Description: Improper input validation in Windows Storage VSP Driver allows an authorized attacker to elevate privileges locally. FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. Windows Storage VSP Dri
msrc
CVE-2025-47973HIGHCVSS 7.82025-07-08
CVE-2025-47973 [HIGH] CWE-126 Microsoft Virtual Hard Disk Elevation of Privilege Vulnerability Microsoft Virtual Hard Disk Elevation of Privilege Vulnerability Description: Buffer over-read in Virtual Hard Disk (VHDX) allows an unauthorized attacker to elevate privileges locally. FAQ: According to the CVSS metric, the attack vector is local (AV:L) while user interaction is required (UI:R). What does that mean for this vulnerability? An attacker can trick a local user on a vulnerable system int
msrc
CVE-2025-49680HIGHCVSS 7.32025-07-08
CVE-2025-49680 [HIGH] CWE-59 Windows Performance Recorder (WPR) Denial of Service Vulnerability Windows Performance Recorder (WPR) Denial of Service Vulnerability Description: Improper link resolution before file access ('link following') in Windows Performance Recorder allows an authorized attacker to deny service locally. FAQ: According to the CVSS metric, user interaction is required (UI:R) and privileges required is Low (PR:L). What does that mean for this vulnerability? Exploitation of th
msrc
CVE-2025-49740HIGHCVSS 8.82025-07-08
CVE-2025-49740 [HIGH] CWE-693 Windows SmartScreen Security Feature Bypass Vulnerability Windows SmartScreen Security Feature Bypass Vulnerability Description: Protection mechanism failure in Windows SmartScreen allows an unauthorized attacker to bypass a security feature over a network. FAQ: What kind of security feature could be bypassed by successfully exploiting this vulnerability? An attacker who successfully exploited the vulnerability could evade Mark of the Web (MOTW) defenses. FAQ: Ho
msrc
CVE-2025-49678HIGHCVSS 7.02025-07-08
CVE-2025-49678 [HIGH] CWE-476 NTFS Elevation of Privilege Vulnerability NTFS Elevation of Privilege Vulnerability Description: Null pointer dereference in Windows NTFS allows an authorized attacker to elevate privileges locally. FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability? Successful exploitation of this vulnerability requires an attacker to win a race condition. FAQ: What privileges could be gained by an attacker who suc
msrc
CVE-2025-49687HIGHCVSS 8.82025-07-08
CVE-2025-49687 [HIGH] CWE-125 Windows Input Method Editor (IME) Elevation of Privilege Vulnerability Windows Input Method Editor (IME) Elevation of Privilege Vulnerability Description: Out-of-bounds read in Microsoft Input Method Editor (IME) allows an authorized attacker to elevate privileges locally. FAQ: What privileges could be gained by an attacker who successfully exploited the vulnerability? An attacker could use this vulnerability to elevate privileges from a Low Integrity Level in a c
msrc
CVE-2025-48805HIGHCVSS 7.82025-07-08
CVE-2025-48805 [HIGH] CWE-122 Microsoft MPEG-2 Video Extension Remote Code Execution Vulnerability Microsoft MPEG-2 Video Extension Remote Code Execution Vulnerability Description: Heap-based buffer overflow in Microsoft MPEG-2 Video Extension allows an authorized attacker to execute code locally. FAQ: According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution? The word Remote in the title refers to the location of the
msrc
CVE-2025-48806HIGHCVSS 7.82025-07-08
CVE-2025-48806 [HIGH] CWE-416 Microsoft MPEG-2 Video Extension Remote Code Execution Vulnerability Microsoft MPEG-2 Video Extension Remote Code Execution Vulnerability Description: Use after free in Microsoft MPEG-2 Video Extension allows an authorized attacker to execute code locally. FAQ: According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution? The word Remote in the title refers to the location of the attacker. Th
msrc
CVE-2025-48819HIGHCVSS 7.12025-07-08
CVE-2025-48819 [HIGH] CWE-591 Windows Universal Plug and Play (UPnP) Device Host Elevation of Privilege Vulnerability Windows Universal Plug and Play (UPnP) Device Host Elevation of Privilege Vulnerability Description: Sensitive data storage in improperly locked memory in Windows Universal Plug and Play (UPnP) Device Host allows an authorized attacker to elevate privileges over an adjacent network. FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for
msrc
CVE-2025-49686HIGHCVSS 7.82025-07-08
CVE-2025-49686 [HIGH] CWE-476 Windows TCP/IP Driver Elevation of Privilege Vulnerability Windows TCP/IP Driver Elevation of Privilege Vulnerability Description: Null pointer dereference in Windows TCP/IP allows an authorized attacker to elevate privileges locally. FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. Windows TCP/IP: Windows TCP/IP Microsoft: Mi
msrc
CVE-2025-47987HIGHCVSS 7.82025-07-08
CVE-2025-47987 [HIGH] CWE-122 Credential Security Support Provider Protocol (CredSSP) Elevation of Privilege Vulnerability Credential Security Support Provider Protocol (CredSSP) Elevation of Privilege Vulnerability Description: Heap-based buffer overflow in Windows Cred SSProvider Protocol allows an authorized attacker to elevate privileges locally. FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vu
msrc
CVE-2025-49724HIGHCVSS 8.82025-07-08
CVE-2025-49724 [HIGH] CWE-416 Windows Connected Devices Platform Service Remote Code Execution Vulnerability Windows Connected Devices Platform Service Remote Code Execution Vulnerability Description: Use after free in Windows Connected Devices Platform Service allows an unauthorized attacker to execute code over a network. FAQ: How could an attacker exploit this vulnerability? To exploit this vulnerability, a remote unauthenticated attacker would need to send specially crafted traffic to a sy
msrc
CVE-2025-49665HIGHCVSS 7.82025-07-08
CVE-2025-49665 [HIGH] CWE-362 Workspace Broker Elevation of Privilege Vulnerability Workspace Broker Elevation of Privilege Vulnerability Description: Concurrent execution using shared resource with improper synchronization ('race condition') in Workspace Broker allows an authorized attacker to elevate privileges locally. FAQ: What privileges could be gained by an attacker who successfully exploited the vulnerability? An attacker who successfully exploited this vulnerability could potentially
msrc
CVE-2025-48816HIGHCVSS 7.82025-07-08
CVE-2025-48816 [HIGH] CWE-190 HID Class Driver Elevation of Privilege Vulnerability HID Class Driver Elevation of Privilege Vulnerability Description: Integer overflow or wraparound in HID class driver allows an authorized attacker to elevate privileges locally. FAQ: What privileges could be gained by an attacker who successfully exploited the vulnerability? An attacker who successfully exploited this vulnerability could gain specific limited SYSTEM privileges. HID class driver: HID class dri
msrc
CVE-2025-49679HIGHCVSS 7.82025-07-08
CVE-2025-49679 [HIGH] CWE-197 Windows Shell Elevation of Privilege Vulnerability Windows Shell Elevation of Privilege Vulnerability Description: Numeric truncation error in Windows Shell allows an authorized attacker to elevate privileges locally. FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. Windows Shell: Windows Shell Microsoft: Microsoft Customer A
msrc
CVE-2025-49667HIGHCVSS 7.82025-07-08
CVE-2025-49667 [HIGH] CWE-415 Windows Win32 Kernel Subsystem Elevation of Privilege Vulnerability Windows Win32 Kernel Subsystem Elevation of Privilege Vulnerability Description: Double free in Windows Win32K - ICOMP allows an authorized attacker to elevate privileges locally. FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. Windows Win32K - ICOMP: Windows
msrc
CVE-2025-47159HIGHCVSS 7.82025-07-08
CVE-2025-47159 [HIGH] CWE-693 Windows Virtualization-Based Security (VBS) Elevation of Privilege Vulnerability Windows Virtualization-Based Security (VBS) Elevation of Privilege Vulnerability Description: Protection mechanism failure in Windows Virtualization-Based Security (VBS) Enclave allows an authorized attacker to elevate privileges locally. FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulne
msrc
CVE-2025-47984HIGHCVSS 7.52025-07-08
CVE-2025-47984 [HIGH] CWE-693 Windows GDI Information Disclosure Vulnerability Windows GDI Information Disclosure Vulnerability Description: Protection mechanism failure in Windows GDI allows an unauthorized attacker to disclose information over a network. FAQ: What type of information could be disclosed by this vulnerability? The type of information that could be disclosed if an attacker successfully exploited this vulnerability is sensitive information. Windows GDI: Windows GDI Microsoft:
msrc
CVE-2025-49742HIGHCVSS 7.82025-07-08
CVE-2025-49742 [HIGH] CWE-190 Windows Graphics Component Remote Code Execution Vulnerability Windows Graphics Component Remote Code Execution Vulnerability Description: Integer overflow or wraparound in Microsoft Graphics Component allows an authorized attacker to execute code locally. FAQ: According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution? The word Remote in the title refers to the location of the attacker. Th
msrc
CVE-2025-49723HIGHCVSS 8.82025-07-08
CVE-2025-49723 [HIGH] CWE-862 Windows StateRepository API Server file Tampering Vulnerability Windows StateRepository API Server file Tampering Vulnerability Description: Missing authorization in Windows StateRepository API allows an authorized attacker to perform tampering locally. FAQ: According to the CVSS metric, successful exploitation could lead to a scope change (S:C). What does this mean for this vulnerability? In this case, a successful attack could be performed from a low privilege A
msrc