Msrc Windows Server 2008 R2 vulnerabilities
2,474 known vulnerabilities affecting msrc/windows_server_2008_r2.
Total CVEs
2,474
CISA KEV
111
actively exploited
Public exploits
175
Exploited in wild
107
Severity breakdown
CRITICAL55HIGH1697MEDIUM701LOW21
Vulnerabilities
Page 13 of 124
CVE-2025-27727HIGHCVSS 7.82025-04-08
CVE-2025-27727 [HIGH] CWE-59 Windows Installer Elevation of Privilege Vulnerability
Windows Installer Elevation of Privilege Vulnerability
Description: Improper link resolution before file access ('link following') in Windows Installer allows an authorized attacker to elevate privileges locally.
FAQ: Are the updates for Windows 10 for x64-based Systems and Windows 10 for 32-bit Systems currently available?
Yes. As of April 9, 2025, the security update (5055547) for Windows 10 for x64-based Sys
msrc
CVE-2025-27487HIGHCVSS 8.02025-04-08
CVE-2025-27487 [HIGH] CWE-122 Remote Desktop Client Remote Code Execution Vulnerability
Remote Desktop Client Remote Code Execution Vulnerability
Description: Heap-based buffer overflow in Remote Desktop Client allows an authorized attacker to execute code over a network.
FAQ: According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?
Exploitation of this vulnerability requires a user to remote into a server that is controlled by an attacker,
msrc
CVE-2025-27471MEDIUMCVSS 5.92025-04-08
CVE-2025-27471 [MEDIUM] CWE-591 Microsoft Streaming Service Denial of Service Vulnerability
Microsoft Streaming Service Denial of Service Vulnerability
Description: Sensitive data storage in improperly locked memory in Microsoft Streaming Service allows an unauthorized attacker to deny service over a network.
FAQ: Are the updates for Windows 10 for x64-based Systems and Windows 10 for 32-bit Systems currently available?
Yes. As of April 9, 2025, the security update (5055547) for Windows 10 for
msrc
CVE-2025-26672MEDIUMCVSS 6.52025-04-08
CVE-2025-26672 [MEDIUM] CWE-126 Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability
Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability
Description: Buffer over-read in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to disclose information over a network.
FAQ: Are the updates for Windows 10 for x64-based Systems and Windows 10 for 32-bit Systems currently available?
Yes. As of April 9, 2025, t
msrc
CVE-2025-21197MEDIUMCVSS 6.52025-04-08
CVE-2025-21197 [MEDIUM] CWE-284 Windows NTFS Information Disclosure Vulnerability
Windows NTFS Information Disclosure Vulnerability
Description: Improper access control in Windows NTFS allows an authorized attacker to disclose file path information under a folder where the attacker doesn't have permission to list content.
FAQ: What type of information could be disclosed by this vulnerability?
The type of information that could be disclosed if an attacker successfully exploited this vulnerabili
msrc
CVE-2025-27742MEDIUMCVSS 5.52025-04-08
CVE-2025-27742 [MEDIUM] CWE-125 NTFS Information Disclosure Vulnerability
NTFS Information Disclosure Vulnerability
Description: Out-of-bounds read in Windows NTFS allows an unauthorized attacker to disclose information locally.
FAQ: What type of information could be disclosed by this vulnerability?
The type of information that could be disclosed if an attacker successfully exploited this vulnerability is sensitive information.
FAQ: Are the updates for Windows 10 for x64-based Systems and Win
msrc
CVE-2025-24056HIGHCVSS 8.82025-03-11
CVE-2025-24056 [HIGH] CWE-122 Windows Telephony Service Remote Code Execution Vulnerability
Windows Telephony Service Remote Code Execution Vulnerability
Description: Heap-based buffer overflow in Windows Telephony Server allows an unauthorized attacker to execute code over a network.
FAQ: According to the CVSS metric, the attack vector is network (AV:N) and the user interaction is required (UI:R). What is the target context of the remote code execution?
This attack requires a client to connec
msrc
CVE-2025-24985HIGHCVSS 7.8KEV2025-03-11
CVE-2025-24985 [HIGH] CWE-190 Windows Fast FAT File System Driver Remote Code Execution Vulnerability
Windows Fast FAT File System Driver Remote Code Execution Vulnerability
Description: Integer overflow or wraparound in Windows Fast FAT Driver allows an unauthorized attacker to execute code locally.
FAQ: According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution?
The word Remote in the title refers to the location of t
msrc
CVE-2025-24072HIGHCVSS 7.82025-03-11
CVE-2025-24072 [HIGH] CWE-416 Microsoft Local Security Authority (LSA) Server Elevation of Privilege Vulnerability
Microsoft Local Security Authority (LSA) Server Elevation of Privilege Vulnerability
Description: Use after free in Microsoft Local Security Authority Server (lsasrv) allows an authorized attacker to elevate privileges locally.
FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability?
An attacker who successfully exploited this vulnerabilit
msrc
CVE-2025-24035HIGHCVSS 8.12025-03-11
CVE-2025-24035 [HIGH] CWE-591 Windows Remote Desktop Services Remote Code Execution Vulnerability
Windows Remote Desktop Services Remote Code Execution Vulnerability
Description: Sensitive data storage in improperly locked memory in Windows Remote Desktop Services allows an unauthorized attacker to execute code over a network.
FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?
Successful exploitation of this vulnerability requir
msrc
CVE-2025-24059HIGHCVSS 7.82025-03-11
CVE-2025-24059 [HIGH] CWE-681 Windows Common Log File System Driver Elevation of Privilege Vulnerability
Windows Common Log File System Driver Elevation of Privilege Vulnerability
Description: Incorrect conversion between numeric types in Windows Common Log File System Driver allows an authorized attacker to elevate privileges locally.
FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability?
An attacker who successfully exploited this vulnerability cou
msrc
CVE-2025-24051HIGHCVSS 8.82025-03-11
CVE-2025-24051 [HIGH] CWE-122 Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
Description: Heap-based buffer overflow in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to execute code over a network.
FAQ: According to the CVSS metric, the attack vector is network (AV:N) and the user interaction is required (UI:R). What is the target context
msrc
CVE-2025-21180HIGHCVSS 7.82025-03-11
CVE-2025-21180 [HIGH] CWE-122 Windows exFAT File System Remote Code Execution Vulnerability
Windows exFAT File System Remote Code Execution Vulnerability
Description: Heap-based buffer overflow in Windows exFAT File System allows an unauthorized attacker to execute code locally.
FAQ: According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution?
The word Remote in the title refers to the location of the attacker. This type
msrc
CVE-2025-24993HIGHCVSS 7.8KEV2025-03-11
CVE-2025-24993 [HIGH] CWE-122 Windows NTFS Remote Code Execution Vulnerability
Windows NTFS Remote Code Execution Vulnerability
Description: Heap-based buffer overflow in Windows NTFS allows an unauthorized attacker to execute code locally.
FAQ: According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution?
The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as
msrc
CVE-2025-26633HIGHCVSS 7.0KEVPoC2025-03-11
CVE-2025-26633 [HIGH] CWE-707 Microsoft Management Console Security Feature Bypass Vulnerability
Microsoft Management Console Security Feature Bypass Vulnerability
Description: Improper neutralization in Microsoft Management Console allows an unauthorized attacker to bypass a security feature locally.
FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?
Successful exploitation of this vulnerability requires an attacker to take add
msrc
CVE-2025-26645HIGHCVSS 8.82025-03-11
CVE-2025-26645 [HIGH] CWE-23 Remote Desktop Client Remote Code Execution Vulnerability
Remote Desktop Client Remote Code Execution Vulnerability
Description: Relative path traversal in Remote Desktop Client allows an unauthorized attacker to execute code over a network.
FAQ: According to the CVSS metric, the attack vector is network (AV:N) and the user interaction is required (UI:R). What is the target context of the remote code execution?
This attack requires an admin user on the client to co
msrc
CVE-2024-9157HIGHCVSS 7.82025-03-11
CVE-2024-9157 [HIGH] Synaptics: CVE-2024-9157 Synaptics Service Binaries DLL Loading Vulnerability
Synaptics: CVE-2024-9157 Synaptics Service Binaries DLL Loading Vulnerability
FAQ: Why is this Synaptics CVE included in the Security Update Guide?
The vulnerability assigned to this CVE is Synaptics' Audio Effects component, which is consumed by Microsoft Windows. It is being documented in the Security Update Guide to announce that the latest builds of Windows are no longer vulnerable. Please see
msrc
CVE-2025-24996MEDIUMCVSS 6.52025-03-11
CVE-2025-24996 [MEDIUM] CWE-73 NTLM Hash Disclosure Spoofing Vulnerability
NTLM Hash Disclosure Spoofing Vulnerability
Description: External control of file name or path in Windows NTLM allows an unauthorized attacker to perform spoofing over a network.
FAQ: According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?
Minimal interaction with a malicious file by a user such as selecting (single-click), inspecting (right-click), or performing an
msrc
CVE-2025-24054MEDIUMCVSS 6.5KEVPoC2025-03-11
CVE-2025-24054 [MEDIUM] CWE-73 NTLM Hash Disclosure Spoofing Vulnerability
NTLM Hash Disclosure Spoofing Vulnerability
Description: External control of file name or path in Windows NTLM allows an unauthorized attacker to perform spoofing over a network.
FAQ: According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?
Minimal interaction with a malicious file by a user such as selecting (single-click), inspecting (right-click), or performing an
msrc
CVE-2025-24991MEDIUMCVSS 5.5KEV2025-03-11
CVE-2025-24991 [MEDIUM] CWE-125 Windows NTFS Information Disclosure Vulnerability
Windows NTFS Information Disclosure Vulnerability
Description: Out-of-bounds read in Windows NTFS allows an authorized attacker to disclose information locally.
FAQ: What type of information could be disclosed by this vulnerability?
An attacker who successfully exploited this vulnerability could potentially read small portions of heap memory.
FAQ: According to the CVSS metric, the attack vector is local (AV:L) w
msrc