Msrc Windows Server 2012 vulnerabilities
3,255 known vulnerabilities affecting msrc/windows_server_2012.
Total CVEs
3,255
CISA KEV
133
actively exploited
Public exploits
200
Exploited in wild
124
Severity breakdown
CRITICAL83HIGH2162MEDIUM978LOW32
Vulnerabilities
Page 14 of 163
CVE-2025-49721HIGHCVSS 7.82025-07-08
CVE-2025-49721 [HIGH] CWE-122 Windows Fast FAT File System Driver Elevation of Privilege Vulnerability
Windows Fast FAT File System Driver Elevation of Privilege Vulnerability
Description: Heap-based buffer overflow in Windows Fast FAT Driver allows an unauthorized attacker to elevate privileges locally.
FAQ: According to the CVSS metric, the attack vector is local (AV:L) while user interaction is required (UI:R). What does that mean for this vulnerability?
An attacker can trick a local user o
msrc
CVE-2025-49661HIGHCVSS 7.82025-07-08
CVE-2025-49661 [HIGH] CWE-822 Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
Description: Untrusted pointer dereference in Windows Ancillary Function Driver for WinSock allows an authorized attacker to elevate privileges locally.
FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability?
An attacker who successfully exploited this vulner
msrc
CVE-2025-48821HIGHCVSS 7.12025-07-08
CVE-2025-48821 [HIGH] CWE-416 Windows Universal Plug and Play (UPnP) Device Host Elevation of Privilege Vulnerability
Windows Universal Plug and Play (UPnP) Device Host Elevation of Privilege Vulnerability
Description: Use after free in Windows Universal Plug and Play (UPnP) Device Host allows an authorized attacker to elevate privileges over an adjacent network.
FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?
Successful expl
msrc
CVE-2025-49689HIGHCVSS 7.82025-07-08
CVE-2025-49689 [HIGH] CWE-190 Microsoft Virtual Hard Disk Elevation of Privilege Vulnerability
Microsoft Virtual Hard Disk Elevation of Privilege Vulnerability
Description: Integer overflow or wraparound in Virtual Hard Disk (VHDX) allows an unauthorized attacker to elevate privileges locally.
FAQ: According to the CVSS metric, the attack vector is local (AV:L) while user interaction is required (UI:R). What does that mean for this vulnerability?
An attacker can trick a local user on a vulnera
msrc
CVE-2025-48814HIGHCVSS 7.52025-07-08
CVE-2025-48814 [HIGH] CWE-306 Remote Desktop Licensing Service Security Feature Bypass Vulnerability
Remote Desktop Licensing Service Security Feature Bypass Vulnerability
Description: Missing authentication for critical function in Windows Remote Desktop Licensing Service allows an unauthorized attacker to bypass a security feature over a network.
FAQ: What security feature is being bypassed?
An attacker with a machine-in-the-middle (MitM) position who successfully exploited this vulnerabilit
msrc
CVE-2025-49674HIGHCVSS 8.82025-07-08
CVE-2025-49674 [HIGH] CWE-122 Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
Description: Heap-based buffer overflow in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to execute code over a network.
FAQ: According to the CVSS metric, the attack vector is network (AV:N), user interaction is required (UI:R), and privileges required are none
msrc
CVE-2025-47975HIGHCVSS 7.02025-07-08
CVE-2025-47975 [HIGH] CWE-415 Windows Simple Search and Discovery Protocol (SSDP) Service Elevation of Privilege Vulnerability
Windows Simple Search and Discovery Protocol (SSDP) Service Elevation of Privilege Vulnerability
Description: Double free in Windows SSDP Service allows an authorized attacker to elevate privileges locally.
FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?
Successful exploitation of this vulnerability r
msrc
CVE-2025-49716HIGHCVSS 7.52025-07-08
CVE-2025-49716 [HIGH] CWE-400 Windows Netlogon Denial of Service Vulnerability
Windows Netlogon Denial of Service Vulnerability
Description: Uncontrolled resource consumption in Windows Netlogon allows an unauthorized attacker to deny service over a network.
FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?
Successful exploitation of this vulnerability requires an attacker to invest time in repeated exploitation attempts throug
msrc
CVE-2025-49729HIGHCVSS 8.82025-07-08
CVE-2025-49729 [HIGH] CWE-122 Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
Description: Heap-based buffer overflow in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to execute code over a network.
FAQ: How could an attacker exploit this vulnerability?
An attacker could exploit this vulnerability by tricking a user into sending a request
msrc
CVE-2025-47971HIGHCVSS 7.82025-07-08
CVE-2025-47971 [HIGH] CWE-126 Microsoft Virtual Hard Disk Elevation of Privilege Vulnerability
Microsoft Virtual Hard Disk Elevation of Privilege Vulnerability
Description: Buffer over-read in Virtual Hard Disk (VHDX) allows an unauthorized attacker to elevate privileges locally.
FAQ: According to the CVSS metric, the attack vector is local (AV:L) while user interaction is required (UI:R). What does that mean for this vulnerability?
An attacker can trick a local user on a vulnerable system int
msrc
CVE-2025-48815HIGHCVSS 7.82025-07-08
CVE-2025-48815 [HIGH] CWE-843 Windows Simple Search and Discovery Protocol (SSDP) Service Elevation of Privilege Vulnerability
Windows Simple Search and Discovery Protocol (SSDP) Service Elevation of Privilege Vulnerability
Description: Access of resource using incompatible type ('type confusion') in Windows SSDP Service allows an authorized attacker to elevate privileges locally.
FAQ: What privileges could be gained by an attacker who successfully exploited the vulnerability?
An attacker who
msrc
CVE-2025-49683HIGHCVSS 7.8PoC2025-07-08
CVE-2025-49683 [HIGH] CWE-190 Microsoft Virtual Hard Disk Remote Code Execution Vulnerability
Microsoft Virtual Hard Disk Remote Code Execution Vulnerability
Description: Integer overflow or wraparound in Virtual Hard Disk (VHDX) allows an unauthorized attacker to execute code locally.
FAQ: According to the CVSS metric, the attack vector is local (AV:L) while user interaction is required (UI:R). What does that mean for this vulnerability?
An attacker can trick a local user on a vulnerable syst
msrc
CVE-2025-47976HIGHCVSS 7.82025-07-08
CVE-2025-47976 [HIGH] CWE-416 Windows Simple Search and Discovery Protocol (SSDP) Service Elevation of Privilege Vulnerability
Windows Simple Search and Discovery Protocol (SSDP) Service Elevation of Privilege Vulnerability
Description: Use after free in Windows SSDP Service allows an authorized attacker to elevate privileges locally.
FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability?
An attacker who successfully exploited this vulnerability coul
msrc
CVE-2025-49676HIGHCVSS 8.82025-07-08
CVE-2025-49676 [HIGH] CWE-122 Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
Description: Heap-based buffer overflow in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to execute code over a network.
FAQ: According to the CVSS metric, the attack vector is network (AV:N), user interaction is required (UI:R), and privileges required are none
msrc
CVE-2025-49673HIGHCVSS 8.82025-07-08
CVE-2025-49673 [HIGH] CWE-122 Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
Description: Heap-based buffer overflow in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to execute code over a network.
FAQ: According to the CVSS metric, the attack vector is network (AV:N), user interaction is required (UI:R), and privileges required are none
msrc
CVE-2025-49663HIGHCVSS 8.82025-07-08
CVE-2025-49663 [HIGH] CWE-122 Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
Description: Heap-based buffer overflow in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to execute code over a network.
FAQ: According to the CVSS metric, the attack vector is network (AV:N), user interaction is required (UI:R), and privileges required are none
msrc
CVE-2025-47985HIGHCVSS 7.82025-07-08
CVE-2025-47985 [HIGH] CWE-822 Windows Event Tracing Elevation of Privilege Vulnerability
Windows Event Tracing Elevation of Privilege Vulnerability
Description: Untrusted pointer dereference in Windows Event Tracing allows an authorized attacker to elevate privileges locally.
FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability?
An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.
Windows Event Tracing: Windows Ev
msrc
CVE-2025-49657HIGHCVSS 8.82025-07-08
CVE-2025-49657 [HIGH] CWE-122 Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
Description: Heap-based buffer overflow in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to execute code over a network.
FAQ: According to the CVSS metric, the attack vector is network (AV:N), user interaction is required (UI:R), and privileges required are none
msrc
CVE-2025-49727HIGHCVSS 7.02025-07-08
CVE-2025-49727 [HIGH] CWE-122 Win32k Elevation of Privilege Vulnerability
Win32k Elevation of Privilege Vulnerability
Description: Heap-based buffer overflow in Windows Win32K - GRFX allows an authorized attacker to elevate privileges locally.
FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability?
An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.
Windows Win32K - GRFX: Windows Win32K - GRFX
Microsoft: Microsoft
msrc
CVE-2025-49675HIGHCVSS 7.82025-07-08
CVE-2025-49675 [HIGH] CWE-416 Kernel Streaming WOW Thunk Service Driver Elevation of Privilege Vulnerability
Kernel Streaming WOW Thunk Service Driver Elevation of Privilege Vulnerability
Description: Use after free in Kernel Streaming WOW Thunk Service Driver allows an authorized attacker to elevate privileges locally.
FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability?
An attacker who successfully exploited this vulnerability could gain SYSTEM p
msrc