Msrc Windows Server 2012 vulnerabilities
3,255 known vulnerabilities affecting msrc/windows_server_2012.
Total CVEs
3,255
CISA KEV
133
actively exploited
Public exploits
200
Exploited in wild
124
Severity breakdown
CRITICAL83HIGH2162MEDIUM978LOW32
Vulnerabilities
Page 3 of 163
CVE-2026-21510HIGHCVSS 8.8KEV2026-02-10
CVE-2026-21510 [HIGH] CWE-693 Windows Shell Security Feature Bypass Vulnerability
Windows Shell Security Feature Bypass Vulnerability
Description: Protection mechanism failure in Windows Shell allows an unauthorized attacker to bypass a security feature over a network.
FAQ: According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?
To successfully exploit this vulnerability, an attacker must convince a user to open a malicious link or shortcu
msrc
CVE-2026-21513HIGHCVSS 8.8KEV2026-02-10
CVE-2026-21513 [HIGH] CWE-693 MSHTML Framework Security Feature Bypass Vulnerability
MSHTML Framework Security Feature Bypass Vulnerability
Description: Protection mechanism failure in MSHTML Framework allows an unauthorized attacker to bypass a security feature over a network.
FAQ: According to the CVSS metric, the attack vector is user interaction is required (UI:R). How could an attacker exploit this security feature bypass vulnerability?
An attacker could exploit this vulnerability by conv
msrc
CVE-2026-21533HIGHCVSS 7.8KEV2026-02-10
CVE-2026-21533 [HIGH] CWE-269 Windows Remote Desktop Services Elevation of Privilege Vulnerability
Windows Remote Desktop Services Elevation of Privilege Vulnerability
Description: Improper privilege management in Windows Remote Desktop allows an authorized attacker to elevate privileges locally.
FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability?
An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.
Windows Remo
msrc
CVE-2026-21525MEDIUMCVSS 6.2KEV2026-02-10
CVE-2026-21525 [MEDIUM] CWE-476 Windows Remote Access Connection Manager Denial of Service Vulnerability
Windows Remote Access Connection Manager Denial of Service Vulnerability
Description: Null pointer dereference in Windows Remote Access Connection Manager allows an unauthorized attacker to deny service locally.
Windows Remote Access Connection Manager: Windows Remote Access Connection Manager
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Denial of Service
Exploit Status: P
msrc
CVE-2026-20929HIGHCVSS 7.52026-01-13
CVE-2026-20929 [HIGH] CWE-284 Windows HTTP.sys Elevation of Privilege Vulnerability
Windows HTTP.sys Elevation of Privilege Vulnerability
Description: Improper access control in Windows HTTP.sys allows an authorized attacker to elevate privileges over a network.
FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?
The Attack requires an Service Principal Name (SPN) that is registered to an account that no longer exists or is not i
msrc
CVE-2026-20931HIGHCVSS 8.02026-01-13
CVE-2026-20931 [HIGH] CWE-73 Windows Telephony Service Elevation of Privilege Vulnerability
Windows Telephony Service Elevation of Privilege Vulnerability
Description: External control of file name or path in Windows Telephony Service allows an authorized attacker to elevate privileges over an adjacent network.
FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability?
An attacker who successfully exploited this vulnerability could gain SYSTEM privileges
msrc
CVE-2026-20921HIGHCVSS 7.52026-01-13
CVE-2026-20921 [HIGH] CWE-362 Windows SMB Server Elevation of Privilege Vulnerability
Windows SMB Server Elevation of Privilege Vulnerability
Description: Concurrent execution using shared resource with improper synchronization ('race condition') in Windows SMB Server allows an authorized attacker to elevate privileges over a network.
FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?
Successful exploitation of this vulnerabilit
msrc
CVE-2026-20869HIGHCVSS 7.02026-01-13
CVE-2026-20869 [HIGH] CWE-362 Windows Local Session Manager (LSM) Elevation of Privilege Vulnerability
Windows Local Session Manager (LSM) Elevation of Privilege Vulnerability
Description: Concurrent execution using shared resource with improper synchronization ('race condition') in Windows Local Session Manager (LSM) allows an authorized attacker to elevate privileges locally.
FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?
msrc
CVE-2026-20922HIGHCVSS 7.82026-01-13
CVE-2026-20922 [HIGH] CWE-122 Windows NTFS Remote Code Execution Vulnerability
Windows NTFS Remote Code Execution Vulnerability
Description: Heap-based buffer overflow in Windows NTFS allows an authorized attacker to execute code locally.
FAQ: According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution?
The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as A
msrc
CVE-2026-20848HIGHCVSS 7.52026-01-13
CVE-2026-20848 [HIGH] CWE-362 Windows SMB Server Elevation of Privilege Vulnerability
Windows SMB Server Elevation of Privilege Vulnerability
Description: Concurrent execution using shared resource with improper synchronization ('race condition') in Windows SMB Server allows an authorized attacker to elevate privileges over a network.
FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability?
An attacker who successfully exploited this vulnerability coul
msrc
CVE-2026-20919HIGHCVSS 7.52026-01-13
CVE-2026-20919 [HIGH] CWE-362 Windows SMB Server Elevation of Privilege Vulnerability
Windows SMB Server Elevation of Privilege Vulnerability
Description: Concurrent execution using shared resource with improper synchronization ('race condition') in Windows SMB Server allows an authorized attacker to elevate privileges over a network.
FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?
Successful exploitation of this vulnerabilit
msrc
CVE-2026-20940HIGHCVSS 7.82026-01-13
CVE-2026-20940 [HIGH] CWE-822 Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability
Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability
Description: Heap-based buffer overflow in Windows Cloud Files Mini Filter Driver allows an authorized attacker to elevate privileges locally.
FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability?
An attacker who successfully exploited this vulnerability could gain SYSTE
msrc
CVE-2026-20840HIGHCVSS 7.82026-01-13
CVE-2026-20840 [HIGH] CWE-122 Windows NTFS Remote Code Execution Vulnerability
Windows NTFS Remote Code Execution Vulnerability
Description: Heap-based buffer overflow in Windows NTFS allows an authorized attacker to execute code locally.
FAQ: According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution?
The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as A
msrc
CVE-2026-20843HIGHCVSS 7.82026-01-13
CVE-2026-20843 [HIGH] CWE-284 Windows Routing and Remote Access Service (RRAS) Elevation of Privilege Vulnerability
Windows Routing and Remote Access Service (RRAS) Elevation of Privilege Vulnerability
Description: Improper access control in Windows Routing and Remote Access Service (RRAS) allows an authorized attacker to elevate privileges locally.
FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability?
An attacker who successfully exploited this vul
msrc
CVE-2026-20856HIGHCVSS 8.12026-01-13
CVE-2026-20856 [HIGH] CWE-20 Windows Server Update Service (WSUS) Remote Code Execution Vulnerability
Windows Server Update Service (WSUS) Remote Code Execution Vulnerability
Description: Improper input validation in Windows Server Update Service allows an unauthorized attacker to execute code over a network.
FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?
The attacker must inject themselves into the logical network path betw
msrc
CVE-2026-20820HIGHCVSS 7.82026-01-13
CVE-2026-20820 [HIGH] CWE-122 Windows Common Log File System Driver Elevation of Privilege Vulnerability
Windows Common Log File System Driver Elevation of Privilege Vulnerability
Description: Heap-based buffer overflow in Windows Common Log File System Driver allows an authorized attacker to elevate privileges locally.
FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability?
An attacker who successfully exploited this vulnerability could gain SYSTEM p
msrc
CVE-2026-20934HIGHCVSS 7.52026-01-13
CVE-2026-20934 [HIGH] CWE-362 Windows SMB Server Elevation of Privilege Vulnerability
Windows SMB Server Elevation of Privilege Vulnerability
Description: Concurrent execution using shared resource with improper synchronization ('race condition') in Windows SMB Server allows an authorized attacker to elevate privileges over a network.
FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?
Successful exploitation of this vulnerabilit
msrc
CVE-2026-20831HIGHCVSS 7.82026-01-13
CVE-2026-20831 [HIGH] CWE-367 Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
Description: Time-of-check time-of-use (toctou) race condition in Windows Ancillary Function Driver for WinSock allows an authorized attacker to elevate privileges locally.
FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability?
An attacker who successfully e
msrc
CVE-2023-31096HIGHCVSS 7.82026-01-13
CVE-2023-31096 [HIGH] CWE-121 MITRE: CVE-2023-31096 Windows Agere Soft Modem Driver Elevation of Privilege Vulnerability
MITRE: CVE-2023-31096 Windows Agere Soft Modem Driver Elevation of Privilege Vulnerability
Description: Microsoft is aware of vulnerabilities in the third party Agere Soft Modem drivers that ship natively with supported Windows operating systems. This is an announcement of the removal of agrsm64.sys and agrsm.sys drivers. The drivers have been removed in the January 2026 cumu
msrc
CVE-2026-20860HIGHCVSS 7.82026-01-13
CVE-2026-20860 [HIGH] CWE-843 Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
Description: Access of resource using incompatible type ('type confusion') in Windows Ancillary Function Driver for WinSock allows an authorized attacker to elevate privileges locally.
FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability?
An attacker who su
msrc