Msrc Windows 11 Version 24H2 For X64-Based Systems vulnerabilities
238 known vulnerabilities affecting msrc/windows_11_version_24h2_for_x64-based_systems.
Total CVEs
238
CISA KEV
4
actively exploited
Public exploits
2
Exploited in wild
0
Severity breakdown
CRITICAL3HIGH154MEDIUM80LOW1
Vulnerabilities
Page 1 of 12
CVE-2026-25167HIGHCVSS 7.42026-03-10
CVE-2026-25167 [HIGH] CWE-416 Microsoft Brokering File System Elevation of Privilege Vulnerability
Microsoft Brokering File System Elevation of Privilege Vulnerability
Description: Use after free in Microsoft Brokering File System allows an unauthorized attacker to elevate privileges locally.
FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?
Successful exploitation of this vulnerability requires an attacker to win a race condit
msrc
CVE-2026-26132HIGHCVSS 7.82026-03-10
CVE-2026-26132 [HIGH] CWE-416 Windows Kernel Elevation of Privilege Vulnerability
Windows Kernel Elevation of Privilege Vulnerability
Description: Use after free in Windows Kernel allows an authorized attacker to elevate privileges locally.
FAQ: What privileges could be gained by an attacker who successfully exploited the vulnerability?
An attacker who successfully exploited this vulnerability could gain administrator privileges.
Windows Kernel: Windows Kernel
Microsoft: Microsoft
Customer
msrc
CVE-2026-23667HIGHCVSS 7.02026-03-10
CVE-2026-23667 [HIGH] CWE-416 Broadcast DVR Elevation of Privilege Vulnerability
Broadcast DVR Elevation of Privilege Vulnerability
Description: Use after free in Broadcast DVR allows an authorized attacker to elevate privileges locally.
FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability?
An attacker who successfully exploited this vulnerability could elevate from a low integrity level up to a medium integrity level.
FAQ: According to the CVSS me
msrc
CVE-2026-25170HIGHCVSS 7.02026-03-10
CVE-2026-25170 [HIGH] CWE-416 Windows Hyper-V Elevation of Privilege Vulnerability
Windows Hyper-V Elevation of Privilege Vulnerability
Description: Use after free in Windows Hyper-V allows an authorized attacker to elevate privileges locally.
FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability?
An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.
FAQ: According to the CVSS metric, the attack complexity is high (
msrc
CVE-2026-24283HIGHCVSS 8.82026-03-10
CVE-2026-24283 [HIGH] CWE-122 Multiple UNC Provider Kernel Driver Elevation of Privilege Vulnerability
Multiple UNC Provider Kernel Driver Elevation of Privilege Vulnerability
Description: Heap-based buffer overflow in Windows File Server allows an authorized attacker to elevate privileges locally.
FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability?
An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.
FAQ: Accor
msrc
CVE-2026-24293HIGHCVSS 7.82026-03-10
CVE-2026-24293 [HIGH] CWE-476 Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
Description: Null pointer dereference in Windows Ancillary Function Driver for WinSock allows an authorized attacker to elevate privileges locally.
FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability?
An attacker who successfully exploited this vulnerabili
msrc
CVE-2026-24282MEDIUMCVSS 5.52026-03-10
CVE-2026-24282 [MEDIUM] CWE-125 Push message Routing Service Elevation of Privilege Vulnerability
Push message Routing Service Elevation of Privilege Vulnerability
Description: Out-of-bounds read in Push Message Routing Service allows an authorized attacker to disclose information locally.
FAQ: What type of information could be disclosed by this vulnerability?
An attacker who successfully exploited this vulnerability could potentially read portions of heap memory.
Push Message Routing Service
msrc
CVE-2026-21237HIGHCVSS 7.02026-02-10
CVE-2026-21237 [HIGH] CWE-362 Windows Subsystem for Linux Elevation of Privilege Vulnerability
Windows Subsystem for Linux Elevation of Privilege Vulnerability
Description: Concurrent execution using shared resource with improper synchronization ('race condition') in Windows Subsystem for Linux allows an authorized attacker to elevate privileges locally.
FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?
For an attacker to explo
msrc
CVE-2026-21245HIGHCVSS 7.82026-02-10
CVE-2026-21245 [HIGH] CWE-122 Windows Kernel Elevation of Privilege Vulnerability
Windows Kernel Elevation of Privilege Vulnerability
Description: Heap-based buffer overflow in Windows Kernel allows an authorized attacker to elevate privileges locally.
FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability?
An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.
Windows Kernel: Windows Kernel
Microsoft: Microsoft
Cus
msrc
CVE-2026-21250HIGHCVSS 7.82026-02-10
CVE-2026-21250 [HIGH] CWE-822 Windows HTTP.sys Elevation of Privilege Vulnerability
Windows HTTP.sys Elevation of Privilege Vulnerability
Description: Untrusted pointer dereference in Windows HTTP.sys allows an authorized attacker to elevate privileges locally.
FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability?
An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.
Windows HTTP.sys: Windows HTTP.sys
Microsoft: M
msrc
CVE-2026-21241HIGHCVSS 7.02026-02-10
CVE-2026-21241 [HIGH] CWE-416 Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
Description: Use after free in Windows Ancillary Function Driver for WinSock allows an authorized attacker to elevate privileges locally.
FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?
For an attacker to exploit this vulnerability,
msrc
CVE-2026-21242HIGHCVSS 7.02026-02-10
CVE-2026-21242 [HIGH] CWE-416 Windows Subsystem for Linux Elevation of Privilege Vulnerability
Windows Subsystem for Linux Elevation of Privilege Vulnerability
Description: Use after free in Windows Subsystem for Linux allows an authorized attacker to elevate privileges locally.
FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability?
An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.
FAQ: According to the CVSS met
msrc
CVE-2026-21232HIGHCVSS 7.82026-02-10
CVE-2026-21232 [HIGH] CWE-822 Windows HTTP.sys Elevation of Privilege Vulnerability
Windows HTTP.sys Elevation of Privilege Vulnerability
Description: Untrusted pointer dereference in Windows HTTP.sys allows an authorized attacker to elevate privileges locally.
FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability?
An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.
Windows HTTP.sys: Windows HTTP.sys
Microsoft: M
msrc
CVE-2026-20815HIGHCVSS 7.02026-01-13
CVE-2026-20815 [HIGH] CWE-362 Capability Access Management Service (camsvc) Elevation of Privilege Vulnerability
Capability Access Management Service (camsvc) Elevation of Privilege Vulnerability
Description: Concurrent execution using shared resource with improper synchronization ('race condition') in Capability Access Management Service (camsvc) allows an authorized attacker to elevate privileges locally.
FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that
msrc
CVE-2026-20859HIGHCVSS 7.82026-01-13
CVE-2026-20859 [HIGH] CWE-416 Windows Kernel-Mode Driver Elevation of Privilege Vulnerability
Windows Kernel-Mode Driver Elevation of Privilege Vulnerability
Description: Use after free in Windows Kernel-Mode Drivers allows an authorized attacker to elevate privileges locally.
FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability?
An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.
Windows Kernel-Mode Drivers: Win
msrc
CVE-2026-21221HIGHCVSS 7.02026-01-13
CVE-2026-21221 [HIGH] CWE-362 Capability Access Management Service (camsvc) Elevation of Privilege Vulnerability
Capability Access Management Service (camsvc) Elevation of Privilege Vulnerability
Description: Concurrent execution using shared resource with improper synchronization ('race condition') in Capability Access Management Service (camsvc) allows an authorized attacker to elevate privileges locally.
FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that
msrc
CVE-2026-20870HIGHCVSS 7.82026-01-13
CVE-2026-20870 [HIGH] CWE-416 Windows Win32 Kernel Subsystem Elevation of Privilege Vulnerability
Windows Win32 Kernel Subsystem Elevation of Privilege Vulnerability
Description: Use after free in Windows Win32K - ICOMP allows an authorized attacker to elevate privileges locally.
FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability?
An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.
Windows Win32K - ICOMP: Windo
msrc
CVE-2026-20842HIGHCVSS 7.02026-01-13
CVE-2026-20842 [HIGH] CWE-416 Microsoft DWM Core Library Elevation of Privilege Vulnerability
Microsoft DWM Core Library Elevation of Privilege Vulnerability
Description: Use after free in Windows DWM allows an authorized attacker to elevate privileges locally.
FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?
For an attacker to exploit this vulnerability, they would need to have knowledge of a specific operation that triggers
msrc
CVE-2026-20854HIGHCVSS 7.52026-01-13
CVE-2026-20854 [HIGH] CWE-416 Windows Local Security Authority Subsystem Service (LSASS) Remote Code Execution Vulnerability
Windows Local Security Authority Subsystem Service (LSASS) Remote Code Execution Vulnerability
Description: Use after free in Windows Local Security Authority Subsystem Service (LSASS) allows an authorized attacker to execute code over a network.
FAQ: How could an attacker exploit this vulnerability?
An attacker with the ability to modify certain directory attributes cou
msrc
CVE-2026-20941HIGHCVSS 7.82026-01-13
CVE-2026-20941 [HIGH] CWE-59 Host Process for Windows Tasks Elevation of Privilege Vulnerability
Host Process for Windows Tasks Elevation of Privilege Vulnerability
Description: Improper link resolution before file access ('link following') in Host Process for Windows Tasks allows an authorized attacker to elevate privileges locally.
FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability?
An attacker who successfully exploited this vulnerability could
msrc
1 / 12Next →