Msrc Windows Server 2012 vulnerabilities
3,255 known vulnerabilities affecting msrc/windows_server_2012.
Total CVEs
3,255
CISA KEV
133
actively exploited
Public exploits
200
Exploited in wild
124
Severity breakdown
CRITICAL83HIGH2162MEDIUM978LOW32
Vulnerabilities
Page 6 of 163
CVE-2025-60704HIGHCVSS 7.52025-11-11
CVE-2025-60704 [HIGH] CWE-325 Windows Kerberos Elevation of Privilege Vulnerability
Windows Kerberos Elevation of Privilege Vulnerability
Description: Missing cryptographic step in Windows Kerberos allows an unauthorized attacker to elevate privileges over a network.
FAQ: How could an attacker exploit this vulnerability?
When multiple attack vectors can be used, we assign a score based on the scenario with the higher risk. In one such scenario for this vulnerability, the attacker could convinc
msrc
CVE-2025-60719HIGHCVSS 7.02025-11-11
CVE-2025-60719 [HIGH] CWE-822 Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
Description: Untrusted pointer dereference in Windows Ancillary Function Driver for WinSock allows an authorized attacker to elevate privileges locally.
FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?
Successful exploitation of this
msrc
CVE-2025-59506HIGHCVSS 7.02025-11-11
CVE-2025-59506 [HIGH] CWE-362 DirectX Graphics Kernel Elevation of Privilege Vulnerability
DirectX Graphics Kernel Elevation of Privilege Vulnerability
Description: Concurrent execution using shared resource with improper synchronization ('race condition') in Windows DirectX allows an authorized attacker to elevate privileges locally.
FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?
Successful exploitation of this vulnerabilit
msrc
CVE-2025-62213HIGHCVSS 7.02025-11-11
CVE-2025-62213 [HIGH] CWE-416 Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
Description: Use after free in Windows Ancillary Function Driver for WinSock allows an authorized attacker to elevate privileges locally.
FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?
Successful exploitation of this vulnerability r
msrc
CVE-2025-60714HIGHCVSS 7.82025-11-11
CVE-2025-60714 [HIGH] CWE-122 Windows OLE Remote Code Execution Vulnerability
Windows OLE Remote Code Execution Vulnerability
Description: Heap-based buffer overflow in Windows OLE allows an unauthorized attacker to execute code locally.
FAQ: According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution?
The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Ar
msrc
CVE-2025-60703HIGHCVSS 7.82025-11-11
CVE-2025-60703 [HIGH] CWE-822 Windows Remote Desktop Services Elevation of Privilege Vulnerability
Windows Remote Desktop Services Elevation of Privilege Vulnerability
Description: Untrusted pointer dereference in Windows Remote Desktop allows an authorized attacker to elevate privileges locally.
FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability?
An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.
Windows Remo
msrc
CVE-2025-60720HIGHCVSS 7.82025-11-11
CVE-2025-60720 [HIGH] CWE-126 Windows Transport Driver Interface (TDI) Translation Driver Elevation of Privilege Vulnerability
Windows Transport Driver Interface (TDI) Translation Driver Elevation of Privilege Vulnerability
Description: Buffer over-read in Windows TDX.sys allows an authorized attacker to elevate privileges locally.
FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability?
An attacker who successfully exploited this vulnerability could g
msrc
CVE-2025-59287CRITICALCVSS 9.8KEVPoC2025-10-14
CVE-2025-59287 [CRITICAL] CWE-502 Windows Server Update Service (WSUS) Remote Code Execution Vulnerability
Windows Server Update Service (WSUS) Remote Code Execution Vulnerability
Description: Deserialization of untrusted data in Windows Server Update Service allows an unauthorized attacker to execute code over a network.
FAQ: How could an attacker exploit this vulnerability?
A remote, unauthenticated attacker could send a crafted event that triggers unsafe object deserialization in a legacy s
msrc
CVE-2025-58725HIGHCVSS 7.02025-10-14
CVE-2025-58725 [HIGH] CWE-122 Windows COM+ Event System Service Elevation of Privilege Vulnerability
Windows COM+ Event System Service Elevation of Privilege Vulnerability
Description: Heap-based buffer overflow in Windows COM allows an authorized attacker to elevate privileges locally.
FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?
Successful exploitation of this vulnerability requires an attacker to win a race condition.
msrc
CVE-2025-59242HIGHCVSS 7.82025-10-14
CVE-2025-59242 [HIGH] CWE-122 Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
Description: Heap-based buffer overflow in Windows Ancillary Function Driver for WinSock allows an authorized attacker to elevate privileges locally.
FAQ: What privileges could be gained by an attacker who successfully exploited the vulnerability?
An attacker who successfully exploited this vulnerabil
msrc
CVE-2025-59187HIGHCVSS 7.82025-10-14
CVE-2025-59187 [HIGH] CWE-20 Windows Kernel Elevation of Privilege Vulnerability
Windows Kernel Elevation of Privilege Vulnerability
Description: Improper input validation in Windows Kernel allows an authorized attacker to elevate privileges locally.
FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability?
An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.
Windows Kernel: Windows Kernel
Microsoft: Microsoft
Custo
msrc
CVE-2025-58726HIGHCVSS 7.52025-10-14
CVE-2025-58726 [HIGH] CWE-284 Windows SMB Server Elevation of Privilege Vulnerability
Windows SMB Server Elevation of Privilege Vulnerability
Description: Improper access control in Windows SMB Server allows an authorized attacker to elevate privileges over a network.
FAQ: How could an attacker exploit the vulnerability?
To exploit this vulnerability, an attacker could execute a specially crafted script to coerce the victim machine to connect back to the attacker’s SMB Server using SMB and aut
msrc
CVE-2025-58714HIGHCVSS 7.82025-10-14
CVE-2025-58714 [HIGH] CWE-284 Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
Description: Improper access control in Windows Ancillary Function Driver for WinSock allows an authorized attacker to elevate privileges locally.
FAQ: What privileges could be gained by an attacker who successfully exploited the vulnerability?
An attacker who successfully exploited this vulnerability
msrc
CVE-2025-55701HIGHCVSS 7.82025-10-14
CVE-2025-55701 [HIGH] CWE-1287 Windows Authentication Elevation of Privilege Vulnerability
Windows Authentication Elevation of Privilege Vulnerability
Description: Improper validation of specified type of input in Microsoft Windows allows an authorized attacker to elevate privileges locally.
FAQ: How could an attacker exploit this vulnerability?
To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that c
msrc
CVE-2025-59282HIGHCVSS 7.02025-10-14
CVE-2025-59282 [HIGH] CWE-362 Internet Information Services (IIS) Inbox COM Objects (Global Memory) Remote Code Execution Vulnerability
Internet Information Services (IIS) Inbox COM Objects (Global Memory) Remote Code Execution Vulnerability
Description: Concurrent execution using shared resource with improper synchronization ('race condition') in Inbox COM Objects allows an unauthorized attacker to execute code locally.
FAQ: According to the CVSS metric, the attack complexity is high (AC:H).
msrc
CVE-2025-59278HIGHCVSS 7.82025-10-14
CVE-2025-59278 [HIGH] CWE-1287 Windows Authentication Elevation of Privilege Vulnerability
Windows Authentication Elevation of Privilege Vulnerability
Description: Improper validation of specified type of input in Windows Authentication Methods allows an authorized attacker to elevate privileges locally.
FAQ: How could an attacker exploit this vulnerability?
To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted appli
msrc
CVE-2025-24052HIGHCVSS 7.82025-10-14
CVE-2025-24052 [HIGH] CWE-121 Windows Agere Modem Driver Elevation of Privilege Vulnerability
Windows Agere Modem Driver Elevation of Privilege Vulnerability
Description: Microsoft is aware of vulnerabilities in the third party Agere Modem driver that ships natively with supported Windows operating systems. This is an announcement of the upcoming removal of ltmdm64.sys driver. The driver has been removed in the October cumulative update.
Fax modem hardware dependent on this specific driver will
msrc
CVE-2025-55687HIGHCVSS 7.42025-10-14
CVE-2025-55687 [HIGH] CWE-362 Windows Resilient File System (ReFS) Elevation of Privilege Vulnerability
Windows Resilient File System (ReFS) Elevation of Privilege Vulnerability
Description: Concurrent execution using shared resource with improper synchronization ('race condition') in Windows Resilient File System (ReFS) allows an unauthorized attacker to elevate privileges locally.
FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerabil
msrc
CVE-2025-58730HIGHCVSS 7.02025-10-14
CVE-2025-58730 [HIGH] CWE-416 Inbox COM Objects (Global Memory) Remote Code Execution Vulnerability
Inbox COM Objects (Global Memory) Remote Code Execution Vulnerability
Description: Use after free in Inbox COM Objects allows an unauthorized attacker to execute code locally.
FAQ: According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?
An attacker must send a user a malicious Office file and convince them to open it.
FAQ: According to the
msrc
CVE-2025-24990HIGHCVSS 7.8KEV2025-10-14
CVE-2025-24990 [HIGH] CWE-822 Windows Agere Modem Driver Elevation of Privilege Vulnerability
Windows Agere Modem Driver Elevation of Privilege Vulnerability
Description: Microsoft is aware of vulnerabilities in the third party Agere Modem driver that ships natively with supported Windows operating systems. This is an announcement of the upcoming removal of ltmdm64.sys driver. The driver has been removed in the October cumulative update.
Fax modem hardware dependent on this specific driver will
msrc