Msrc Windows 11 Version 25H2 vulnerabilities
254 known vulnerabilities affecting msrc/windows_11_version_25h2.
Total CVEs
254
CISA KEV
11
actively exploited
Public exploits
3
Exploited in wild
0
Severity breakdown
CRITICAL3HIGH186MEDIUM63LOW2
Vulnerabilities
Page 4 of 13
CVE-2026-20919HIGHCVSS 7.52026-01-13
CVE-2026-20919 [HIGH] CWE-362 Windows SMB Server Elevation of Privilege Vulnerability
Windows SMB Server Elevation of Privilege Vulnerability
Description: Concurrent execution using shared resource with improper synchronization ('race condition') in Windows SMB Server allows an authorized attacker to elevate privileges over a network.
FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?
Successful exploitation of this vulnerabilit
msrc
CVE-2026-20865HIGHCVSS 7.82026-01-13
CVE-2026-20865 [HIGH] CWE-416 Windows Management Services Elevation of Privilege Vulnerability
Windows Management Services Elevation of Privilege Vulnerability
Description: Use after free in Windows Management Services allows an authorized attacker to elevate privileges locally.
FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?
Successful exploitation of this vulnerability requires an attacker to win a race condition.
FAQ: Acc
msrc
CVE-2026-20809HIGHCVSS 7.82026-01-13
CVE-2026-20809 [HIGH] CWE-367 Windows Kernel Memory Elevation of Privilege Vulnerability
Windows Kernel Memory Elevation of Privilege Vulnerability
Description: Time-of-check time-of-use (toctou) race condition in Windows Kernel Memory allows an authorized attacker to elevate privileges locally.
FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability?
An attacker who successfully exploited this vulnerability could gain Kernel Memory Access.
Windows Ke
msrc
CVE-2026-20840HIGHCVSS 7.82026-01-13
CVE-2026-20840 [HIGH] CWE-122 Windows NTFS Remote Code Execution Vulnerability
Windows NTFS Remote Code Execution Vulnerability
Description: Heap-based buffer overflow in Windows NTFS allows an authorized attacker to execute code locally.
FAQ: According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution?
The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as A
msrc
CVE-2026-20843HIGHCVSS 7.82026-01-13
CVE-2026-20843 [HIGH] CWE-284 Windows Routing and Remote Access Service (RRAS) Elevation of Privilege Vulnerability
Windows Routing and Remote Access Service (RRAS) Elevation of Privilege Vulnerability
Description: Improper access control in Windows Routing and Remote Access Service (RRAS) allows an authorized attacker to elevate privileges locally.
FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability?
An attacker who successfully exploited this vul
msrc
CVE-2026-20856HIGHCVSS 8.12026-01-13
CVE-2026-20856 [HIGH] CWE-20 Windows Server Update Service (WSUS) Remote Code Execution Vulnerability
Windows Server Update Service (WSUS) Remote Code Execution Vulnerability
Description: Improper input validation in Windows Server Update Service allows an unauthorized attacker to execute code over a network.
FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?
The attacker must inject themselves into the logical network path betw
msrc
CVE-2026-20852HIGHCVSS 7.72026-01-13
CVE-2026-20852 [HIGH] CWE-266 Windows Hello Tampering Vulnerability
Windows Hello Tampering Vulnerability
Description: Incorrect privilege assignment in Windows Hello allows an unauthorized attacker to perform tampering locally.
Windows Hello: Windows Hello
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Tampering
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely
Reference: https://catalog.update.microsoft.com/v7/site/Search.asp
msrc
CVE-2026-20836HIGHCVSS 7.02026-01-13
CVE-2026-20836 [HIGH] CWE-362 DirectX Graphics Kernel Elevation of Privilege Vulnerability
DirectX Graphics Kernel Elevation of Privilege Vulnerability
Description: Concurrent execution using shared resource with improper synchronization ('race condition') in Graphics Kernel allows an authorized attacker to elevate privileges locally.
FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability?
An attacker who successfully exploited this vulnerability coul
msrc
CVE-2026-20866HIGHCVSS 7.82026-01-13
CVE-2026-20866 [HIGH] CWE-362 Windows Management Services Elevation of Privilege Vulnerability
Windows Management Services Elevation of Privilege Vulnerability
Description: Concurrent execution using shared resource with improper synchronization ('race condition') in Windows Management Services allows an authorized attacker to elevate privileges locally.
FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?
Successful exploitation
msrc
CVE-2026-20844HIGHCVSS 7.42026-01-13
CVE-2026-20844 [HIGH] CWE-416 Windows Clipboard Server Elevation of Privilege Vulnerability
Windows Clipboard Server Elevation of Privilege Vulnerability
Description: Use after free in Windows Clipboard Server allows an unauthorized attacker to elevate privileges locally.
FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability?
An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.
FAQ: According to the CVSS metric, th
msrc
CVE-2026-20820HIGHCVSS 7.82026-01-13
CVE-2026-20820 [HIGH] CWE-122 Windows Common Log File System Driver Elevation of Privilege Vulnerability
Windows Common Log File System Driver Elevation of Privilege Vulnerability
Description: Heap-based buffer overflow in Windows Common Log File System Driver allows an authorized attacker to elevate privileges locally.
FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability?
An attacker who successfully exploited this vulnerability could gain SYSTEM p
msrc
CVE-2026-20858HIGHCVSS 7.82026-01-13
CVE-2026-20858 [HIGH] CWE-416 Windows Management Services Elevation of Privilege Vulnerability
Windows Management Services Elevation of Privilege Vulnerability
Description: Use after free in Windows Management Services allows an authorized attacker to elevate privileges locally.
FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?
Successful exploitation of this vulnerability requires an attacker to win a race condition.
FAQ: Acc
msrc
CVE-2026-20934HIGHCVSS 7.52026-01-13
CVE-2026-20934 [HIGH] CWE-362 Windows SMB Server Elevation of Privilege Vulnerability
Windows SMB Server Elevation of Privilege Vulnerability
Description: Concurrent execution using shared resource with improper synchronization ('race condition') in Windows SMB Server allows an authorized attacker to elevate privileges over a network.
FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?
Successful exploitation of this vulnerabilit
msrc
CVE-2026-20831HIGHCVSS 7.82026-01-13
CVE-2026-20831 [HIGH] CWE-367 Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
Description: Time-of-check time-of-use (toctou) race condition in Windows Ancillary Function Driver for WinSock allows an authorized attacker to elevate privileges locally.
FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability?
An attacker who successfully e
msrc
CVE-2023-31096HIGHCVSS 7.82026-01-13
CVE-2023-31096 [HIGH] CWE-121 MITRE: CVE-2023-31096 Windows Agere Soft Modem Driver Elevation of Privilege Vulnerability
MITRE: CVE-2023-31096 Windows Agere Soft Modem Driver Elevation of Privilege Vulnerability
Description: Microsoft is aware of vulnerabilities in the third party Agere Soft Modem drivers that ship natively with supported Windows operating systems. This is an announcement of the removal of agrsm64.sys and agrsm.sys drivers. The drivers have been removed in the January 2026 cumu
msrc
CVE-2026-20860HIGHCVSS 7.82026-01-13
CVE-2026-20860 [HIGH] CWE-843 Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
Description: Access of resource using incompatible type ('type confusion') in Windows Ancillary Function Driver for WinSock allows an authorized attacker to elevate privileges locally.
FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability?
An attacker who su
msrc
CVE-2026-20874HIGHCVSS 7.82026-01-13
CVE-2026-20874 [HIGH] CWE-362 Windows Management Services Elevation of Privilege Vulnerability
Windows Management Services Elevation of Privilege Vulnerability
Description: Concurrent execution using shared resource with improper synchronization ('race condition') in Windows Management Services allows an authorized attacker to elevate privileges locally.
FAQ: According to the CVSS metric, successful exploitation could lead to a scope change (S:C). What does this mean for this vulnerability?
In
msrc
CVE-2026-20877HIGHCVSS 7.82026-01-13
CVE-2026-20877 [HIGH] CWE-416 Windows Management Services Elevation of Privilege Vulnerability
Windows Management Services Elevation of Privilege Vulnerability
Description: Use after free in Windows Management Services allows an authorized attacker to elevate privileges locally.
FAQ: According to the CVSS metric, successful exploitation could lead to a scope change (S:C). What does this mean for this vulnerability?
In this case, a successful attack could be performed from a low privilege AppCo
msrc
CVE-2026-20849HIGHCVSS 7.52026-01-13
CVE-2026-20849 [HIGH] CWE-807 Windows Kerberos Elevation of Privilege Vulnerability
Windows Kerberos Elevation of Privilege Vulnerability
Description: Reliance on untrusted inputs in a security decision in Windows Kerberos allows an authorized attacker to elevate privileges over a network.
FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?
A high attack complexity means the attacker must be able to perform a precise machine‑in‑t
msrc
CVE-2026-20822HIGHCVSS 7.82026-01-13
CVE-2026-20822 [HIGH] CWE-416 Windows Graphics Component Elevation of Privilege Vulnerability
Windows Graphics Component Elevation of Privilege Vulnerability
Description: Use after free in Microsoft Graphics Component allows an authorized attacker to elevate privileges locally.
FAQ: According to the CVSS metric, a successful exploitation could lead to a scope change (S:C). What does this mean for this vulnerability?
In a GPU paravirtualization scenario, an attacker who successfully exploited t
msrc