Msrc Windows 8.1 For X64-Based Systems vulnerabilities

157 known vulnerabilities affecting msrc/windows_8.1_for_x64-based_systems.

Total CVEs
157
CISA KEV
3
actively exploited
Public exploits
23
Exploited in wild
4
Severity breakdown
CRITICAL6HIGH69MEDIUM72LOW10

Vulnerabilities

Page 1 of 8
CVE-2022-44682MEDIUMCVSS 6.82022-12-13
CVE-2022-44682 [MEDIUM] Windows Hyper-V Denial of Service Vulnerability Windows Hyper-V Denial of Service Vulnerability FAQ: According to the CVSS metric, the Hyper-V attack vector is adjacent (AV:A). What does that mean for this vulnerability? Where the attack vector metric is Adjacent (A), this represents virtual machines connected via a Hyper-V Network Virtualization (HNV) logical network. This configuration forms an isolation boundary where the virtual machines within the virtual network ca
msrc
CVE-2022-30144HIGHCVSS 7.52022-08-09
CVE-2022-30144 [HIGH] Windows Bluetooth Service Remote Code Execution Vulnerability Windows Bluetooth Service Remote Code Execution Vulnerability FAQ: According to the CVSS metric, the attack vector is adjacent (AV:A). What does that mean for this vulnerability? This vulnerability's attack is limited at the protocol level to a logically adjacent topology. This means it cannot simply be done across the internet, but instead needs something specific tied to the target. Good examples would include
msrc
CVE-2022-34696HIGHCVSS 7.82022-08-09
CVE-2022-34696 [HIGH] Windows Hyper-V Remote Code Execution Vulnerability Windows Hyper-V Remote Code Execution Vulnerability FAQ: According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution? The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally. The vulnerable endpoint is only available
msrc
CVE-2022-30135HIGHCVSS 7.82022-06-14
CVE-2022-30135 [HIGH] Windows Media Center Elevation of Privilege Vulnerability Windows Media Center Elevation of Privilege Vulnerability Windows Media: Windows Media Microsoft: Microsoft Customer Action Required: Yes Impact: Elevation of Privilege Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5014748 Referenc
msrc
CVE-2022-22008HIGHCVSS 7.82022-04-12
CVE-2022-22008 [HIGH] Windows Hyper-V Remote Code Execution Vulnerability Windows Hyper-V Remote Code Execution Vulnerability FAQ: According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution? The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally. For example, when the score indicates tha
msrc
CVE-2022-21973MEDIUMCVSS 5.52022-03-08
CVE-2022-21973 [MEDIUM] Windows Media Center Update Denial of Service Vulnerability Windows Media Center Update Denial of Service Vulnerability Windows Media: Windows Media Microsoft: Microsoft Customer Action Required: Yes Impact: Denial of Service Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5011552 Referen
msrc
CVE-2022-21975MEDIUMCVSS 4.72022-03-08
CVE-2022-21975 [MEDIUM] Windows Hyper-V Denial of Service Vulnerability Windows Hyper-V Denial of Service Vulnerability FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability? Successful exploitation of this vulnerability requires an attacker to win a race condition. Role: Windows Hyper-V: Role: Windows Hyper-V Microsoft: Microsoft Customer Action Required: Yes Impact: Denial of Service Exploit Status: Publicly Disclosed:No;Explo
msrc
CVE-2022-21901CRITICALCVSS 9.02022-01-11
CVE-2022-21901 [CRITICAL] Windows Hyper-V Elevation of Privilege Vulnerability Windows Hyper-V Elevation of Privilege Vulnerability FAQ: How could an attacker exploit this vulnerability? An authenticated attacker could run a specially crafted application on a vulnerable Hyper-V guest to exploit this vulnerability which, if successful, could potentially interact with processes of another Hyper-V guest hosted on the same Hyper-V host. Role: Windows Hyper-V: Role: Windows Hyper-V Microsoft: Micr
msrc
CVE-2022-21899MEDIUMCVSS 5.52022-01-11
CVE-2022-21899 [MEDIUM] Windows Extensible Firmware Interface Security Feature Bypass Vulnerability Windows Extensible Firmware Interface Security Feature Bypass Vulnerability Windows UEFI: Windows UEFI Microsoft: Microsoft Customer Action Required: Yes Impact: Security Feature Bypass Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely Reference: https://catalog.update.microsoft.com/v7/site/Sear
msrc
CVE-2021-43245HIGHCVSS 7.82021-12-14
CVE-2021-43245 [HIGH] Windows Digital TV Tuner Elevation of Privilege Vulnerability Windows Digital TV Tuner Elevation of Privilege Vulnerability Windows Digital TV Tuner: Windows Digital TV Tuner Microsoft: Microsoft Impact: Elevation of Privilege Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5015861 Reference
msrc
CVE-2021-40441HIGHCVSS 7.82021-12-14
CVE-2021-40441 [HIGH] Windows Media Center Elevation of Privilege Vulnerability Windows Media Center Elevation of Privilege Vulnerability Windows Media: Windows Media Microsoft: Microsoft Impact: Elevation of Privilege Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5008244 Reference: https://support.microsoft.co
msrc
CVE-2021-42284MEDIUMCVSS 6.82021-11-09
CVE-2021-42284 [MEDIUM] Windows Hyper-V Denial of Service Vulnerability Windows Hyper-V Denial of Service Vulnerability FAQ: What are the vulnerable configurations of Hyper-V? Any installation of Hyper-V that exposes one or more virtual switches to guests would be vulnerable. Role: Windows Hyper-V: Role: Windows Hyper-V Microsoft: Microsoft Customer Action Required: Yes Impact: Denial of Service Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Li
msrc
CVE-2021-36927HIGHCVSS 7.82021-08-10
CVE-2021-36927 [HIGH] Windows Digital TV Tuner device registration application Elevation of Privilege Vulnerability Windows Digital TV Tuner device registration application Elevation of Privilege Vulnerability Windows Media: Windows Media Microsoft: Microsoft Impact: Elevation of Privilege Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A Reference: https://catalog.update.microsoft.com/
msrc
CVE-2021-28444MEDIUMCVSS 5.72021-04-13
CVE-2021-28444 [MEDIUM] Windows Hyper-V Security Feature Bypass Vulnerability Windows Hyper-V Security Feature Bypass Vulnerability FAQ: What configurations or versions could be at risk from this vulnerability? This bypass could affect any Hyper-V configurations that are using Router Guard. What is the exposure if the vulnerability was bypassed? Certain packets that would normally be blocked or dropped could be processed. This could allow an attacker to bypass set policy, potentially influencin
msrc
CVE-2021-26879HIGHCVSS 7.52021-03-09
CVE-2021-26879 [HIGH] Windows Network Address Translation (NAT) Denial of Service Vulnerability Windows Network Address Translation (NAT) Denial of Service Vulnerability Role: Windows Hyper-V: Role: Windows Hyper-V Microsoft: Microsoft Impact: Denial of Service Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB50008
msrc
CVE-2021-24076MEDIUMCVSS 5.52021-02-09
CVE-2021-24076 [MEDIUM] Microsoft Windows VMSwitch Information Disclosure Vulnerability Microsoft Windows VMSwitch Information Disclosure Vulnerability FAQ: What type of information could be disclosed by this vulnerability? The type of information that could be disclosed if an attacker successfully exploited this vulnerability is uninitialized memory. Role: Windows Hyper-V: Role: Windows Hyper-V Microsoft: Microsoft Impact: Information Disclosure Exploit Status: Publicly Disclosed:No;Exploi
msrc
CVE-2021-1692HIGHCVSS 7.72021-01-12
CVE-2021-1692 [HIGH] Windows Hyper-V Denial of Service Vulnerability Windows Hyper-V Denial of Service Vulnerability Windows Hyper-V: Windows Hyper-V Microsoft: Microsoft Customer Action Required: Yes Impact: Denial of Service Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4601319 Reference: https://support.mic
msrc
CVE-2020-17040MEDIUMCVSS 6.52020-11-10
CVE-2020-17040 [MEDIUM] Windows Hyper-V Security Feature Bypass Vulnerability Windows Hyper-V Security Feature Bypass Vulnerability FAQ: What configurations or versions could be at risk from this vulnerability? This bypass could affect any Hyper-V configurations that are using Router Guard. What is the exposure if the vulnerability was bypassed? Certain packets that would normally be blocked or dropped could be processed. This could allow an attacker to bypass set policy, potentially influencin
msrc
CVE-2020-0689HIGHCVSS 8.22020-02-11
CVE-2020-0689 [MEDIUM] Microsoft Secure Boot Security Feature Bypass Vulnerability Microsoft Secure Boot Security Feature Bypass Vulnerability Description: A security feature bypass vulnerability exists in secure boot. An attacker who successfully exploited the vulnerability can bypass secure boot and load untrusted software. To exploit the vulnerability, an attacker could run a specially crafted application. The security update addresses the vulnerability by blocking vulnerable third-party boo
msrc
CVE-2020-0716MEDIUMCVSS 5.52020-02-11
CVE-2020-0716 [MEDIUM] Win32k Information Disclosure Vulnerability Win32k Information Disclosure Vulnerability Description: An information disclosure vulnerability exists when the win32k component improperly provides kernel information. An attacker who successfully exploited the vulnerability could obtain information to further compromise the user’s system. To exploit this vulnerability, an attacker would have to log on to an affected system and run a specially crafted application. The security
msrc