Msrc Windows Server 2008 R2 vulnerabilities
2,474 known vulnerabilities affecting msrc/windows_server_2008_r2.
Total CVEs
2,474
CISA KEV
111
actively exploited
Public exploits
175
Exploited in wild
107
Severity breakdown
CRITICAL55HIGH1697MEDIUM701LOW21
Vulnerabilities
Page 52 of 124
CVE-2022-35743HIGHCVSS 7.82022-08-09
CVE-2022-35743 [HIGH] Microsoft Windows Support Diagnostic Tool (MSDT) Remote Code Execution Vulnerability
Microsoft Windows Support Diagnostic Tool (MSDT) Remote Code Execution Vulnerability
FAQ: According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution?
The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself
msrc
CVE-2022-35767HIGHCVSS 8.12022-08-09
CVE-2022-35767 [HIGH] Windows Secure Socket Tunneling Protocol (SSTP) Remote Code Execution Vulnerability
Windows Secure Socket Tunneling Protocol (SSTP) Remote Code Execution Vulnerability
FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?
Successful exploitation of this vulnerability requires an attacker to win a race condition.
FAQ: How could an attacker exploit this vulnerability?
An unauthenticated attacker could send a spe
msrc
CVE-2022-35760HIGHCVSS 7.82022-08-09
CVE-2022-35760 [HIGH] Microsoft ATA Port Driver Elevation of Privilege Vulnerability
Microsoft ATA Port Driver Elevation of Privilege Vulnerability
FAQ: According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?
This vulnerability could be triggered when a windows client connects to a malicious remote share.
FAQ: What privileges could be gained by an attacker who successfully exploited the vulnerability?
A domain user could use this vulnerabi
msrc
CVE-2022-35750HIGHCVSS 7.82022-08-09
CVE-2022-35750 [HIGH] Win32k Elevation of Privilege Vulnerability
Win32k Elevation of Privilege Vulnerability
FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability?
An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.
Windows Canonical Display Driver: Windows Canonical Display Driver
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Elevation of Privilege
Exploit Status: Publicly Disclosed:No;Exploited:
msrc
CVE-2022-35769HIGHCVSS 7.52022-08-09
CVE-2022-35769 [HIGH] Windows Point-to-Point Protocol (PPP) Denial of Service Vulnerability
Windows Point-to-Point Protocol (PPP) Denial of Service Vulnerability
Remote Access Service Point-to-Point Tunneling Protocol: Remote Access Service Point-to-Point Tunneling Protocol
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Denial of Service
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Li
msrc
CVE-2022-34702HIGHCVSS 8.12022-08-09
CVE-2022-34702 [HIGH] Windows Secure Socket Tunneling Protocol (SSTP) Remote Code Execution Vulnerability
Windows Secure Socket Tunneling Protocol (SSTP) Remote Code Execution Vulnerability
FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?
Successful exploitation of this vulnerability requires an attacker to win a race condition.
FAQ: How could an attacker exploit this vulnerability?
An unauthenticated attacker could send a spe
msrc
CVE-2022-35745HIGHCVSS 8.12022-08-09
CVE-2022-35745 [HIGH] Windows Secure Socket Tunneling Protocol (SSTP) Remote Code Execution Vulnerability
Windows Secure Socket Tunneling Protocol (SSTP) Remote Code Execution Vulnerability
FAQ: How could an attacker exploit this vulnerability?
An unauthenticated attacker could send a specially crafted protocol message to a Routing and Remote Access Service (RRAS) server, which could lead to remote code execution (RCE) on the RAS server machine.
FAQ: According to the CVSS metric, the attack co
msrc
CVE-2022-34707HIGHCVSS 7.82022-08-09
CVE-2022-34707 [HIGH] Windows Kernel Elevation of Privilege Vulnerability
Windows Kernel Elevation of Privilege Vulnerability
FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability?
An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.
Windows Kernel: Windows Kernel
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Elevation of Privilege
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software R
msrc
CVE-2022-34690HIGHCVSS 7.12022-08-09
CVE-2022-34690 [HIGH] Windows Fax Service Elevation of Privilege Vulnerability
Windows Fax Service Elevation of Privilege Vulnerability
FAQ: What privileges could be gained by an attacker who successfully exploited the vulnerability?
An attacker would only be able to delete targeted files on a system. They would not gain privileges to view or modify file contents.
Role: Windows Fax Service: Role: Windows Fax Service
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Elevation of Pri
msrc
CVE-2022-35756HIGHCVSS 7.82022-08-09
CVE-2022-35756 [HIGH] Windows Kerberos Elevation of Privilege Vulnerability
Windows Kerberos Elevation of Privilege Vulnerability
FAQ: According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?
Exploitation of this vulnerability requires that a user trigger the payload in the application.
FAQ: What privileges could be gained by an attacker who successfully exploited the vulnerability?
An attacker who successfully exploited this vulnerability
msrc
CVE-2022-35752HIGHCVSS 8.12022-08-09
CVE-2022-35752 [HIGH] Windows Secure Socket Tunneling Protocol (SSTP) Remote Code Execution Vulnerability
Windows Secure Socket Tunneling Protocol (SSTP) Remote Code Execution Vulnerability
FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?
Successful exploitation of this vulnerability requires an attacker to win a race condition.
FAQ: How could an attacker exploit this vulnerability?
The vulnerable system can be exploited witho
msrc
CVE-2022-34706HIGHCVSS 7.82022-08-09
CVE-2022-34706 [HIGH] Windows Local Security Authority (LSA) Elevation of Privilege Vulnerability
Windows Local Security Authority (LSA) Elevation of Privilege Vulnerability
FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability?
An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.
Windows Local Security Authority (LSA): Windows Local Security Authority (LSA)
Microsoft: Microsoft
Customer Action Required: Yes
Impa
msrc
CVE-2022-34713HIGHCVSS 7.8KEV2022-08-09
CVE-2022-34713 [HIGH] Microsoft Windows Support Diagnostic Tool (MSDT) Remote Code Execution Vulnerability
Microsoft Windows Support Diagnostic Tool (MSDT) Remote Code Execution Vulnerability
FAQ: According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution?
The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself
msrc
CVE-2022-34691HIGHCVSS 8.82022-08-09
CVE-2022-34691 [HIGH] Active Directory Domain Services Elevation of Privilege Vulnerability
Active Directory Domain Services Elevation of Privilege Vulnerability
FAQ: How could an attacker exploit this vulnerability?
An authenticated user could manipulate attributes on computer accounts they own or manage, and acquire a certificate from Active Directory Certificate Services that would allow elevation of privilege to System.
FAQ: Where can I find out more information about this vulnerability?
P
msrc
CVE-2022-35820HIGHCVSS 7.82022-08-09
CVE-2022-35820 [HIGH] Windows Bluetooth Driver Elevation of Privilege Vulnerability
Windows Bluetooth Driver Elevation of Privilege Vulnerability
FAQ: What privileges could be gained by an attacker who successfully exploited the vulnerability?
An authorized local attacker could exploit this Windows Bluetooth driver vulnerability by programmatically running certain functions to arbitrarily gain registry key creation and deletion in the bthport.sys driver.
Microsoft Bluetooth Driver: Microsoft B
msrc
CVE-2022-34714HIGHCVSS 8.12022-08-09
CVE-2022-34714 [HIGH] Windows Secure Socket Tunneling Protocol (SSTP) Remote Code Execution Vulnerability
Windows Secure Socket Tunneling Protocol (SSTP) Remote Code Execution Vulnerability
FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?
Successful exploitation of this vulnerability requires an attacker to win a race condition.
FAQ: How could an attacker exploit this vulnerability?
An unauthenticated attacker could send a spe
msrc
CVE-2022-35753HIGHCVSS 8.12022-08-09
CVE-2022-35753 [HIGH] Windows Secure Socket Tunneling Protocol (SSTP) Remote Code Execution Vulnerability
Windows Secure Socket Tunneling Protocol (SSTP) Remote Code Execution Vulnerability
FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?
Successful exploitation of this vulnerability requires an attacker to win a race condition.
FAQ: How could an attacker exploit this vulnerability?
The vulnerable system can be exploited witho
msrc
CVE-2022-35758MEDIUMCVSS 5.52022-08-09
CVE-2022-35758 [MEDIUM] Windows Kernel Memory Information Disclosure Vulnerability
Windows Kernel Memory Information Disclosure Vulnerability
FAQ: What type of information could be disclosed by this vulnerability?
The type of information that could be disclosed if an attacker successfully exploited this vulnerability is the contents of Kernel memory. An attacker could read the contents of Kernel memory from a user mode process.
Windows Kernel: Windows Kernel
Microsoft: Microsoft
Customer Act
msrc
CVE-2022-35747MEDIUMCVSS 5.92022-08-09
CVE-2022-35747 [MEDIUM] Windows Point-to-Point Protocol (PPP) Denial of Service Vulnerability
Windows Point-to-Point Protocol (PPP) Denial of Service Vulnerability
FAQ: How could an attacker exploit this vulnerability?
An unauthenticated attacker could send a specially crafted connection request to a RAS server, which could lead to denial of service (DOS) on the RAS server machine.
FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerabili
msrc
CVE-2022-35759MEDIUMCVSS 6.52022-08-09
CVE-2022-35759 [MEDIUM] Windows Local Security Authority (LSA) Denial of Service Vulnerability
Windows Local Security Authority (LSA) Denial of Service Vulnerability
Windows Local Security Authority (LSA): Windows Local Security Authority (LSA)
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Denial of Service
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A
Reference: https
msrc