Msrc Windows 8.1 vulnerabilities
1,848 known vulnerabilities affecting msrc/windows_8.1.
Total CVEs
1,848
CISA KEV
80
actively exploited
Public exploits
162
Exploited in wild
91
Severity breakdown
CRITICAL29HIGH1242MEDIUM556LOW21
Vulnerabilities
Page 22 of 93
CVE-2022-21963MEDIUMCVSS 6.42022-01-11
CVE-2022-21963 [MEDIUM] Windows Resilient File System (ReFS) Remote Code Execution Vulnerability
Windows Resilient File System (ReFS) Remote Code Execution Vulnerability
FAQ: According to the CVSS metric, the attack vector is physical (AV:P). What does that mean for this vulnerability?
An attacker with physical access to a vulnerable system could insert a specially crafted USB device.
Are there additional attack vectors?
This vulnerability could also be exploited through a local attack vector.
msrc
CVE-2022-21928MEDIUMCVSS 6.32022-01-11
CVE-2022-21928 [MEDIUM] Windows Resilient File System (ReFS) Remote Code Execution Vulnerability
Windows Resilient File System (ReFS) Remote Code Execution Vulnerability
FAQ: According to the CVSS metric, the attack vector is physical (AV:P). What does that mean for this vulnerability?
An attacker with physical access to a vulnerable system could insert a specially crafted USB device.
Are there additional attack vectors?
This vulnerability could also be exploited through a local attack vector.
msrc
CVE-2022-21959MEDIUMCVSS 6.82022-01-11
CVE-2022-21959 [MEDIUM] Windows Resilient File System (ReFS) Remote Code Execution Vulnerability
Windows Resilient File System (ReFS) Remote Code Execution Vulnerability
FAQ: According to the CVSS metric, the attack vector is physical (AV:P). What does that mean for this vulnerability?
An attacker with physical access to a vulnerable system could insert a specially crafted USB device.
Are there additional attack vectors?
This vulnerability could also be exploited through a local attack vector.
msrc
CVE-2022-21962MEDIUMCVSS 6.82022-01-11
CVE-2022-21962 [MEDIUM] Windows Resilient File System (ReFS) Remote Code Execution Vulnerability
Windows Resilient File System (ReFS) Remote Code Execution Vulnerability
FAQ: According to the CVSS metric, the attack vector is physical (AV:P). What does that mean for this vulnerability?
An attacker with physical access to a vulnerable system could insert a specially crafted USB device.
Are there additional attack vectors?
This vulnerability could also be exploited through a local attack vector.
msrc
CVE-2022-21960MEDIUMCVSS 6.82022-01-11
CVE-2022-21960 [MEDIUM] Windows Resilient File System (ReFS) Remote Code Execution Vulnerability
Windows Resilient File System (ReFS) Remote Code Execution Vulnerability
FAQ: According to the CVSS metric, the attack vector is physical (AV:P). What does that mean for this vulnerability?
An attacker with physical access to a vulnerable system could insert a specially crafted USB device.
Are there additional attack vectors?
This vulnerability could also be exploited through a local attack vector.
msrc
CVE-2022-21924MEDIUMCVSS 5.32022-01-11
CVE-2022-21924 [MEDIUM] Workstation Service Remote Protocol Security Feature Bypass Vulnerability
Workstation Service Remote Protocol Security Feature Bypass Vulnerability
Windows Workstation Service Remote Protocol: Windows Workstation Service Remote Protocol
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Security Feature Bypass
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely
Re
msrc
CVE-2022-21905MEDIUMCVSS 4.62022-01-11
CVE-2022-21905 [MEDIUM] Windows Hyper-V Security Feature Bypass Vulnerability
Windows Hyper-V Security Feature Bypass Vulnerability
FAQ: What configurations or versions could be at risk from this vulnerability?
This bypass could affect any Hyper-V configurations that are using Router Guard.
What is the exposure if the vulnerability was bypassed?
Certain packets that would normally be blocked or dropped could be processed. This could allow an attacker to bypass set policy, potentially influencin
msrc
CVE-2022-21894MEDIUMCVSS 4.4Exploited2022-01-11
CVE-2022-21894 [MEDIUM] Secure Boot Security Feature Bypass Vulnerability
Secure Boot Security Feature Bypass Vulnerability
Windows Secure Boot: Windows Secure Boot
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Security Feature Bypass
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely
Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5009557
Reference: https:
msrc
CVE-2022-21892MEDIUMCVSS 6.82022-01-11
CVE-2022-21892 [MEDIUM] Windows Resilient File System (ReFS) Remote Code Execution Vulnerability
Windows Resilient File System (ReFS) Remote Code Execution Vulnerability
FAQ: According to the CVSS metric, the attack vector is physical (AV:P). What does that mean for this vulnerability?
An attacker with physical access to a vulnerable system could insert a specially crafted USB device.
Are there additional attack vectors?
This vulnerability could also be exploited through a local attack vector.
msrc
CVE-2021-43215CRITICALCVSS 9.82021-12-14
CVE-2021-43215 [CRITICAL] iSNS Server Memory Corruption Vulnerability Can Lead to Remote Code Execution
iSNS Server Memory Corruption Vulnerability Can Lead to Remote Code Execution
FAQ: How could an attacker exploit this vulnerability?
An attacker could send a specially crafted request to the Internet Storage Name Service (iSNS) server, which could result in remote code execution.
FAQ: What is Windows iSNS?
The Internet Storage Name Service (iSNS) protocol is used for interaction between iSNS
msrc
CVE-2021-43223HIGHCVSS 7.82021-12-14
CVE-2021-43223 [HIGH] Windows Remote Access Connection Manager Elevation of Privilege Vulnerability
Windows Remote Access Connection Manager Elevation of Privilege Vulnerability
Windows Remote Access Connection Manager: Windows Remote Access Connection Manager
Microsoft: Microsoft
Impact: Elevation of Privilege
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A
Reference: https://catalog
msrc
CVE-2021-43893HIGHCVSS 7.52021-12-14
CVE-2021-43893 [HIGH] Windows Encrypting File System (EFS) Elevation of Privilege Vulnerability
Windows Encrypting File System (EFS) Elevation of Privilege Vulnerability
Windows Encrypting File System (EFS): Windows Encrypting File System (EFS)
Microsoft: Microsoft
Impact: Elevation of Privilege
Exploit Status: Publicly Disclosed:Yes;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A
Reference: https://catalog.update.microso
msrc
CVE-2021-43883HIGHCVSS 7.82021-12-14
CVE-2021-43883 [HIGH] Windows Installer Elevation of Privilege Vulnerability
Windows Installer Elevation of Privilege Vulnerability
Windows Installer: Windows Installer
Microsoft: Microsoft
Impact: Elevation of Privilege
Exploit Status: Publicly Disclosed:Yes;Exploited:No;Latest Software Release:Exploitation More Likely;Older Software Release:Exploitation More Likely;DOS:N/A
Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5008218
Reference: https://support.microsoft
msrc
CVE-2021-43238HIGHCVSS 7.82021-12-14
CVE-2021-43238 [HIGH] Windows Remote Access Elevation of Privilege Vulnerability
Windows Remote Access Elevation of Privilege Vulnerability
Windows Remote Access Connection Manager: Windows Remote Access Connection Manager
Microsoft: Microsoft
Impact: Elevation of Privilege
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A
Reference: https://catalog.update.microsoft.com/v7/site/Search.a
msrc
CVE-2021-43248HIGHCVSS 7.82021-12-14
CVE-2021-43248 [HIGH] Windows Digital Media Receiver Elevation of Privilege Vulnerability
Windows Digital Media Receiver Elevation of Privilege Vulnerability
Microsoft Windows Codecs Library: Microsoft Windows Codecs Library
Microsoft: Microsoft
Impact: Elevation of Privilege
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A
Reference: https://catalog.update.microsoft.com/v7/site/Search
msrc
CVE-2021-43236HIGHCVSS 7.52021-12-14
CVE-2021-43236 [HIGH] Microsoft Message Queuing Information Disclosure Vulnerability
Microsoft Message Queuing Information Disclosure Vulnerability
FAQ: What type of information could be disclosed by this vulnerability?
The type of information that could be disclosed if an attacker successfully exploited this vulnerability is uninitialized memory.
Windows Message Queuing: Windows Message Queuing
Microsoft: Microsoft
Impact: Information Disclosure
Exploit Status: Publicly Disclosed:No;Exploi
msrc
CVE-2021-43207HIGHCVSS 7.8Exploited2021-12-14
CVE-2021-43207 [HIGH] Windows Common Log File System Driver Elevation of Privilege Vulnerability
Windows Common Log File System Driver Elevation of Privilege Vulnerability
Windows Common Log File System Driver: Windows Common Log File System Driver
Microsoft: Microsoft
Impact: Elevation of Privilege
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation More Likely;Older Software Release:Exploitation More Likely;DOS:N/A
Reference: https://catalog.update.micr
msrc
CVE-2021-43217HIGHCVSS 8.12021-12-14
CVE-2021-43217 [HIGH] Windows Encrypting File System (EFS) Remote Code Execution Vulnerability
Windows Encrypting File System (EFS) Remote Code Execution Vulnerability
FAQ: What is the attack vector for this vulnerability?
An attacker could cause a buffer overflow write leading to unauthenticated non-sandboxed code execution.
Does EFS need to be in use for this to be exploited?
No. EFS interfaces trigger a start to the EFS service if it isn’t already running.
How does Microsoft plan to address
msrc
CVE-2021-43229HIGHCVSS 7.82021-12-14
CVE-2021-43229 [HIGH] Windows NTFS Elevation of Privilege Vulnerability
Windows NTFS Elevation of Privilege Vulnerability
Windows NTFS: Windows NTFS
Microsoft: Microsoft
Impact: Elevation of Privilege
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A
Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5008218
Reference: https://support.microsoft.com/help/5008218
Re
msrc
CVE-2021-43233HIGHCVSS 7.52021-12-14
CVE-2021-43233 [HIGH] Remote Desktop Client Remote Code Execution Vulnerability
Remote Desktop Client Remote Code Execution Vulnerability
Remote Desktop Client: Remote Desktop Client
Microsoft: Microsoft
Impact: Remote Code Execution
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation More Likely;Older Software Release:Exploitation More Likely;DOS:N/A
Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5008218
Reference: https://suppo
msrc