Msrc Windows Server 2012 R2 vulnerabilities
3,441 known vulnerabilities affecting msrc/windows_server_2012_r2.
Total CVEs
3,441
CISA KEV
141
actively exploited
Public exploits
207
Exploited in wild
131
Severity breakdown
CRITICAL86HIGH2272MEDIUM1047LOW36
Vulnerabilities
Page 26 of 173
CVE-2025-21287HIGHCVSS 7.82025-01-14
CVE-2025-21287 [HIGH] CWE-269 Windows Installer Elevation of Privilege Vulnerability
Windows Installer Elevation of Privilege Vulnerability
FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability?
An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.
Windows Installer: Windows Installer
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Elevation of Privilege
Exploit Status: Publicly Disclosed:No;Exploited:
msrc
CVE-2025-21378HIGHCVSS 7.82025-01-14
CVE-2025-21378 [HIGH] CWE-122 Windows CSC Service Elevation of Privilege Vulnerability
Windows CSC Service Elevation of Privilege Vulnerability
FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability?
An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.
Windows Client-Side Caching (CSC) Service: Windows Client-Side Caching (CSC) Service
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Elevation of Privile
msrc
CVE-2025-21244HIGHCVSS 8.82025-01-14
CVE-2025-21244 [HIGH] CWE-190 Windows Telephony Service Remote Code Execution Vulnerability
Windows Telephony Service Remote Code Execution Vulnerability
FAQ: How could an attacker exploit this vulnerability?
An attacker could exploit this vulnerability by tricking a user into sending a request to a malicious server. This could result in the server returning malicious data that might cause arbitrary code execution on the user's system.
Windows Telephony Service: Windows Telephony Service
Micr
msrc
CVE-2025-21300HIGHCVSS 7.52025-01-14
CVE-2025-21300 [HIGH] CWE-400 Windows Universal Plug and Play (UPnP) Device Host Denial of Service Vulnerability
Windows Universal Plug and Play (UPnP) Device Host Denial of Service Vulnerability
Windows Universal Plug and Play (UPnP) Device Host: Windows Universal Plug and Play (UPnP) Device Host
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Denial of Service
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely
Reference: https:/
msrc
CVE-2025-21243HIGHCVSS 8.82025-01-14
CVE-2025-21243 [HIGH] CWE-190 Windows Telephony Service Remote Code Execution Vulnerability
Windows Telephony Service Remote Code Execution Vulnerability
FAQ: How could an attacker exploit this vulnerability?
An attacker could exploit this vulnerability by tricking a user into sending a request to a malicious server. This could result in the server returning malicious data that might cause arbitrary code execution on the user's system.
Windows Telephony Service: Windows Telephony Service
Micr
msrc
CVE-2025-21303HIGHCVSS 8.82025-01-14
CVE-2025-21303 [HIGH] CWE-122 Windows Telephony Service Remote Code Execution Vulnerability
Windows Telephony Service Remote Code Execution Vulnerability
FAQ: How could an attacker exploit this vulnerability?
An attacker could exploit this vulnerability by tricking a user into sending a request to a malicious server. This could result in the server returning malicious data that might cause arbitrary code execution on the user's system.
Windows Telephony Service: Windows Telephony Service
Micr
msrc
CVE-2025-21290HIGHCVSS 7.52025-01-14
CVE-2025-21290 [HIGH] CWE-400 Microsoft Message Queuing (MSMQ) Denial of Service Vulnerability
Microsoft Message Queuing (MSMQ) Denial of Service Vulnerability
FAQ: According to the CVSS metrics, successful exploitation of this vulnerability could lead to major loss of availability (A:H). What does that mean for this vulnerability?
An attacker can send specially crafted packets which could affect availability of the service and result in Denial of Service (DoS).
Windows Message Queuing: Window
msrc
CVE-2025-21295HIGHCVSS 8.12025-01-14
CVE-2025-21295 [HIGH] CWE-416 SPNEGO Extended Negotiation (NEGOEX) Security Mechanism Remote Code Execution Vulnerability
SPNEGO Extended Negotiation (NEGOEX) Security Mechanism Remote Code Execution Vulnerability
FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?
Successful exploitation of this vulnerability requires an attacker to manipulate system operations in a specific manner.
FAQ: How could an attacker exploit the vulnera
msrc
CVE-2025-21273HIGHCVSS 8.82025-01-14
CVE-2025-21273 [HIGH] CWE-122 Windows Telephony Service Remote Code Execution Vulnerability
Windows Telephony Service Remote Code Execution Vulnerability
FAQ: How could an attacker exploit this vulnerability?
An attacker could exploit this vulnerability by tricking a user into sending a request to a malicious server. This could result in the server returning malicious data that might cause arbitrary code execution on the user's system.
Windows Telephony Service: Windows Telephony Service
Micr
msrc
CVE-2025-21276HIGHCVSS 7.52025-01-14
CVE-2025-21276 [HIGH] CWE-191 Windows MapUrlToZone Denial of Service Vulnerability
Windows MapUrlToZone Denial of Service Vulnerability
FAQ: According to the CVSS metrics, successful exploitation of this vulnerability could lead to major loss of availability (A:H). What does that mean for this vulnerability?
An attacker can send specially crafted packets which could affect availability of the service and result in Denial of Service (DoS).
FAQ: The Security Updates table indicates that this vul
msrc
CVE-2025-21411HIGHCVSS 8.82025-01-14
CVE-2025-21411 [HIGH] CWE-122 Windows Telephony Service Remote Code Execution Vulnerability
Windows Telephony Service Remote Code Execution Vulnerability
FAQ: How could an attacker exploit this vulnerability?
An attacker could exploit this vulnerability by tricking a user into sending a request to a malicious server. This could result in the server returning malicious data that might cause arbitrary code execution on the user's system.
Windows Telephony Service: Windows Telephony Service
Micr
msrc
CVE-2025-21270HIGHCVSS 7.52025-01-14
CVE-2025-21270 [HIGH] CWE-400 Microsoft Message Queuing (MSMQ) Denial of Service Vulnerability
Microsoft Message Queuing (MSMQ) Denial of Service Vulnerability
FAQ: According to the CVSS metrics, successful exploitation of this vulnerability could lead to major loss of availability (A:H). What does that mean for this vulnerability?
An attacker can send specially crafted packets which could affect availability of the service and result in Denial of Service (DoS).
Windows Message Queuing: Window
msrc
CVE-2025-21231HIGHCVSS 7.52025-01-14
CVE-2025-21231 [HIGH] CWE-400 IP Helper Denial of Service Vulnerability
IP Helper Denial of Service Vulnerability
FAQ: According to the CVSS metric, the attack vector is network (AV:N). How could an attacker exploit this vulnerability?
As an authenticated user, the attacker could send a specially crafted string of data over the network, causing the application to crash.
IP Helper: IP Helper
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Denial of Service
Exploit Status: Publicl
msrc
CVE-2025-21306HIGHCVSS 8.82025-01-14
CVE-2025-21306 [HIGH] CWE-122 Windows Telephony Service Remote Code Execution Vulnerability
Windows Telephony Service Remote Code Execution Vulnerability
FAQ: How could an attacker exploit this vulnerability?
An attacker could exploit this vulnerability by tricking a user into sending a request to a malicious server. This could result in the server returning malicious data that might cause arbitrary code execution on the user's system.
Windows Telephony Service: Windows Telephony Service
Micr
msrc
CVE-2025-21230HIGHCVSS 7.52025-01-14
CVE-2025-21230 [HIGH] CWE-20 Microsoft Message Queuing (MSMQ) Denial of Service Vulnerability
Microsoft Message Queuing (MSMQ) Denial of Service Vulnerability
FAQ: According to the CVSS metrics, successful exploitation of this vulnerability could lead to major loss of availability (A:H). What does that mean for this vulnerability?
An attacker can send specially crafted packets which could affect availability of the service and result in Denial of Service (DoS).
Windows Message Queuing: Windows
msrc
CVE-2025-21296HIGHCVSS 7.52025-01-14
CVE-2025-21296 [HIGH] CWE-416 BranchCache Remote Code Execution Vulnerability
BranchCache Remote Code Execution Vulnerability
FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?
Successful exploitation of this vulnerability requires an attacker to win a race condition.
FAQ: According to the CVSS score, the attack vector is adjacent (AV:A). What does this mean for this vulnerability?
This attack is limited to systems connected to
msrc
CVE-2025-21218HIGHCVSS 7.52025-01-14
CVE-2025-21218 [HIGH] CWE-400 Windows Kerberos Denial of Service Vulnerability
Windows Kerberos Denial of Service Vulnerability
FAQ: How could an attacker exploit this vulnerability?
An unauthenticated attacker could use a specially crafted application to leverage a protocol vulnerability in the Kerberos Key Distribution Center (KDC) Proxy Service to perform denial of service against the target.
Windows Kerberos: Windows Kerberos
Microsoft: Microsoft
Customer Action Required: Yes
Impact: De
msrc
CVE-2025-21305HIGHCVSS 8.82025-01-14
CVE-2025-21305 [HIGH] CWE-122 Windows Telephony Service Remote Code Execution Vulnerability
Windows Telephony Service Remote Code Execution Vulnerability
FAQ: How could an attacker exploit this vulnerability?
An attacker could exploit this vulnerability by tricking a user into sending a request to a malicious server. This could result in the server returning malicious data that might cause arbitrary code execution on the user's system.
Windows Telephony Service: Windows Telephony Service
Micr
msrc
CVE-2025-21240HIGHCVSS 8.82025-01-14
CVE-2025-21240 [HIGH] CWE-122 Windows Telephony Service Remote Code Execution Vulnerability
Windows Telephony Service Remote Code Execution Vulnerability
FAQ: How could an attacker exploit this vulnerability?
An attacker could exploit this vulnerability by tricking a user into sending a request to a malicious server. This could result in the server returning malicious data that might cause arbitrary code execution on the user's system.
Windows Telephony Service: Windows Telephony Service
Micr
msrc
CVE-2025-21336MEDIUMCVSS 5.62025-01-14
CVE-2025-21336 [MEDIUM] CWE-203 Windows Cryptographic Information Disclosure Vulnerability
Windows Cryptographic Information Disclosure Vulnerability
FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?
Successful exploitation of this vulnerability requires an attacker to carefully time their actions to exploit the timing differences in the execution of specific operations. They must accurately measure these timing variations to in
msrc