Msrc Windows Server 2012 vulnerabilities
3,255 known vulnerabilities affecting msrc/windows_server_2012.
Total CVEs
3,255
CISA KEV
133
actively exploited
Public exploits
200
Exploited in wild
124
Severity breakdown
CRITICAL83HIGH2162MEDIUM978LOW32
Vulnerabilities
Page 56 of 163
CVE-2023-32039MEDIUMCVSS 5.52023-07-11
CVE-2023-32039 [MEDIUM] CWE-125 Microsoft PostScript and PCL6 Class Printer Driver Information Disclosure Vulnerability
Microsoft PostScript and PCL6 Class Printer Driver Information Disclosure Vulnerability
FAQ: What type of information could be disclosed by this vulnerability?
An attacker who successfully exploited this vulnerability could view heap memory from a privileged process running on the server.
Microsoft Printer Drivers: Microsoft Printer Drivers
Microsoft: Microsoft
Customer Act
msrc
CVE-2023-35324MEDIUMCVSS 5.52023-07-11
CVE-2023-35324 [MEDIUM] CWE-126 Microsoft PostScript and PCL6 Class Printer Driver Information Disclosure Vulnerability
Microsoft PostScript and PCL6 Class Printer Driver Information Disclosure Vulnerability
FAQ: What type of information could be disclosed by this vulnerability?
An attacker who successfully exploited this vulnerability could potentially read small portions of heap memory.
Microsoft Printer Drivers: Microsoft Printer Drivers
Microsoft: Microsoft
Customer Action Required: Yes
msrc
CVE-2023-33167MEDIUMCVSS 6.52023-07-11
CVE-2023-33167 [MEDIUM] CWE-126 Remote Procedure Call Runtime Denial of Service Vulnerability
Remote Procedure Call Runtime Denial of Service Vulnerability
Windows Remote Procedure Call: Windows Remote Procedure Call
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Denial of Service
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;DOS:N/A
Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5028168
Reference:
msrc
CVE-2023-33166MEDIUMCVSS 6.52023-07-11
CVE-2023-33166 [MEDIUM] CWE-126 Remote Procedure Call Runtime Denial of Service Vulnerability
Remote Procedure Call Runtime Denial of Service Vulnerability
Windows Remote Procedure Call: Windows Remote Procedure Call
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Denial of Service
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;DOS:N/A
Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5028168
Reference:
msrc
CVE-2023-35332MEDIUMCVSS 6.82023-07-11
CVE-2023-35332 [MEDIUM] CWE-326 Windows Remote Desktop Protocol Security Feature Bypass
Windows Remote Desktop Protocol Security Feature Bypass
FAQ: What security feature is bypassed with this vulnerability?
The RDP Gateway protocol is enforcing the usage of Datagram Transport Layer Security (DTLS) version 1.0, which is a deprecated (RFC 8996) protocol with known vulnerabilities. An attacker with a machine-in-the-middle (MitM) position who successfully exploited this vulnerability could comprom
msrc
CVE-2023-32085MEDIUMCVSS 5.52023-07-11
CVE-2023-32085 [MEDIUM] CWE-126 Microsoft PostScript and PCL6 Class Printer Driver Information Disclosure Vulnerability
Microsoft PostScript and PCL6 Class Printer Driver Information Disclosure Vulnerability
FAQ: How could an attacker exploit this vulnerability?
An authenticated attacker with normal user permissions could use the Microsoft PS Class Driver to print a malicious XPS file, which could enable an information disclosure attack on the machine.
Please see Standard XPS Filters for more i
msrc
CVE-2023-32033MEDIUMCVSS 6.62023-07-11
CVE-2023-32033 [MEDIUM] CWE-416 Microsoft Failover Cluster Remote Code Execution Vulnerability
Microsoft Failover Cluster Remote Code Execution Vulnerability
FAQ: According to the CVSS metric, privileges required is high (PR:H). What does that mean for this vulnerability?
Successful exploitation of this vulnerability requires the attacker or targeted user to have specific elevated privileges. Only users with roles “Cluster Admin” and “Cluster Operator” can access this.
Windows Cluster Server:
msrc
CVE-2023-32043MEDIUMCVSS 6.82023-07-11
CVE-2023-32043 [MEDIUM] CWE-327 Windows Remote Desktop Security Feature Bypass Vulnerability
Windows Remote Desktop Security Feature Bypass Vulnerability
FAQ: What security feature is being bypassed?
An attacker with a machine-in-the-middle (MitM) position who successfully exploited this vulnerability could bypass the certificate validation performed when a targeted user connects to a trusted server.
Windows Remote Desktop: Windows Remote Desktop
Microsoft: Microsoft
Customer Action Required
msrc
CVE-2023-33168MEDIUMCVSS 6.52023-07-11
CVE-2023-33168 [MEDIUM] CWE-126 Remote Procedure Call Runtime Denial of Service Vulnerability
Remote Procedure Call Runtime Denial of Service Vulnerability
Windows Remote Procedure Call: Windows Remote Procedure Call
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Denial of Service
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;DOS:N/A
Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5028168
Reference:
msrc
CVE-2023-32055MEDIUMCVSS 6.72023-07-11
CVE-2023-32055 [MEDIUM] CWE-416 Active Template Library Elevation of Privilege Vulnerability
Active Template Library Elevation of Privilege Vulnerability
FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?
Successful exploitation of this vulnerability requires an attacker to take additional actions prior to exploitation to prepare the target environment.
FAQ: What privileges could be gained by an attacker who successfully exploit
msrc
CVE-2023-35310MEDIUMCVSS 6.62023-07-11
CVE-2023-35310 [MEDIUM] CWE-591 Windows DNS Server Remote Code Execution Vulnerability
Windows DNS Server Remote Code Execution Vulnerability
FAQ: According to the CVSS metric, privileges required is high (PR:H). What does that mean for this vulnerability?
Successful exploitation of this vulnerability requires the attacker or targeted user to have specific elevated privileges. As is best practice, regular validation and audits of administrative groups should be conducted.
FAQ: According to the
msrc
CVE-2023-32034MEDIUMCVSS 6.52023-07-11
CVE-2023-32034 [MEDIUM] CWE-125 Remote Procedure Call Runtime Denial of Service Vulnerability
Remote Procedure Call Runtime Denial of Service Vulnerability
Windows Remote Procedure Call: Windows Remote Procedure Call
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Denial of Service
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;DOS:N/A
Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5028168
Reference:
msrc
CVE-2023-35346MEDIUMCVSS 6.62023-07-11
CVE-2023-35346 [MEDIUM] CWE-591 Windows DNS Server Remote Code Execution Vulnerability
Windows DNS Server Remote Code Execution Vulnerability
FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?
Successful exploitation of this vulnerability requires an attacker to win a race condition.
FAQ: According to the CVSS metric, privileges required is high (PR:H). What does that mean for this vulnerability?
Successful exploitation of this
msrc
CVE-2023-32042MEDIUMCVSS 6.52023-07-11
CVE-2023-32042 [MEDIUM] CWE-908 OLE Automation Information Disclosure Vulnerability
OLE Automation Information Disclosure Vulnerability
FAQ: What type of information could be disclosed by this vulnerability?
The type of information that could be disclosed if an attacker successfully exploited this vulnerability is uninitialized memory.
Windows OLE: Windows OLE
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Information Disclosure
Exploit Status: Publicly Disclosed:No;Exploited:N
msrc
CVE-2023-35351MEDIUMCVSS 6.62023-07-11
CVE-2023-35351 [MEDIUM] CWE-416 Windows Active Directory Certificate Services (AD CS) Remote Code Execution Vulnerability
Windows Active Directory Certificate Services (AD CS) Remote Code Execution Vulnerability
FAQ: How could an attacker exploit this vulnerability?
An attacker with Certificate Authority (CA) read access permissions can send a specially crafted request to a vulnerable Certificate Server. By default, only domain administrators are granted CA read access.
FAQ: According to the C
msrc
CVE-2023-35319MEDIUMCVSS 6.52023-07-11
CVE-2023-35319 [MEDIUM] CWE-125 Remote Procedure Call Runtime Denial of Service Vulnerability
Remote Procedure Call Runtime Denial of Service Vulnerability
Windows Remote Procedure Call: Windows Remote Procedure Call
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Denial of Service
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;DOS:N/A
Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5028168
Reference:
msrc
CVE-2023-35344MEDIUMCVSS 6.62023-07-11
CVE-2023-35344 [MEDIUM] CWE-591 Windows DNS Server Remote Code Execution Vulnerability
Windows DNS Server Remote Code Execution Vulnerability
FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?
Successful exploitation of this vulnerability requires an attacker to win a race condition.
FAQ: According to the CVSS metric, privileges required is high (PR:H). What does that mean for this vulnerability?
Successful exploitation of this
msrc
CVE-2023-35331MEDIUMCVSS 6.52023-07-11
CVE-2023-35331 [MEDIUM] Windows Local Security Authority (LSA) Denial of Service Vulnerability
Windows Local Security Authority (LSA) Denial of Service Vulnerability
FAQ: According to the CVSS metric, the attack vector is adjacent (AV:A). What does that mean for this vulnerability?
Successful exploitation of this vulnerability requires that an attacker will need to first gain access to the restricted network before running an attack.
Windows Local Security Authority (LSA): Windows Local Securi
msrc
CVE-2023-35316MEDIUMCVSS 6.52023-07-11
CVE-2023-35316 [MEDIUM] CWE-125 Remote Procedure Call Runtime Information Disclosure Vulnerability
Remote Procedure Call Runtime Information Disclosure Vulnerability
FAQ: What type of information could be disclosed by this vulnerability?
An attacker who successfully exploited this vulnerability could potentially read small portions of heap memory.
Windows Remote Procedure Call: Windows Remote Procedure Call
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Information Disclosure
E
msrc
CVE-2023-33173MEDIUMCVSS 6.52023-07-11
CVE-2023-33173 [MEDIUM] CWE-126 Remote Procedure Call Runtime Denial of Service Vulnerability
Remote Procedure Call Runtime Denial of Service Vulnerability
Windows Remote Procedure Call: Windows Remote Procedure Call
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Denial of Service
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;DOS:N/A
Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5028168
Reference:
msrc