Msrc Windows Server 2012 R2 vulnerabilities
3,441 known vulnerabilities affecting msrc/windows_server_2012_r2.
Total CVEs
3,441
CISA KEV
141
actively exploited
Public exploits
207
Exploited in wild
131
Severity breakdown
CRITICAL86HIGH2272MEDIUM1047LOW36
Vulnerabilities
Page 3 of 173
CVE-2026-21236HIGHCVSS 7.82026-02-10
CVE-2026-21236 [HIGH] CWE-122 Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
Description: Heap-based buffer overflow in Windows Ancillary Function Driver for WinSock allows an authorized attacker to elevate privileges locally.
FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability?
An attacker who successfully exploited this vulnerabi
msrc
CVE-2026-21510HIGHCVSS 8.8KEV2026-02-10
CVE-2026-21510 [HIGH] CWE-693 Windows Shell Security Feature Bypass Vulnerability
Windows Shell Security Feature Bypass Vulnerability
Description: Protection mechanism failure in Windows Shell allows an unauthorized attacker to bypass a security feature over a network.
FAQ: According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?
To successfully exploit this vulnerability, an attacker must convince a user to open a malicious link or shortcu
msrc
CVE-2026-21513HIGHCVSS 8.8KEV2026-02-10
CVE-2026-21513 [HIGH] CWE-693 MSHTML Framework Security Feature Bypass Vulnerability
MSHTML Framework Security Feature Bypass Vulnerability
Description: Protection mechanism failure in MSHTML Framework allows an unauthorized attacker to bypass a security feature over a network.
FAQ: According to the CVSS metric, the attack vector is user interaction is required (UI:R). How could an attacker exploit this security feature bypass vulnerability?
An attacker could exploit this vulnerability by conv
msrc
CVE-2026-21533HIGHCVSS 7.8KEV2026-02-10
CVE-2026-21533 [HIGH] CWE-269 Windows Remote Desktop Services Elevation of Privilege Vulnerability
Windows Remote Desktop Services Elevation of Privilege Vulnerability
Description: Improper privilege management in Windows Remote Desktop allows an authorized attacker to elevate privileges locally.
FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability?
An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.
Windows Remo
msrc
CVE-2026-21222MEDIUMCVSS 5.52026-02-10
CVE-2026-21222 [MEDIUM] CWE-532 Windows Kernel Information Disclosure Vulnerability
Windows Kernel Information Disclosure Vulnerability
Description: Insertion of sensitive information into log file in Windows Kernel allows an authorized attacker to disclose information locally.
FAQ: What type of information could be disclosed by this vulnerability?
The type of information that could be disclosed if an attacker successfully exploited this vulnerability is Kernel memory read - unintentional read
msrc
CVE-2026-21525MEDIUMCVSS 6.2KEV2026-02-10
CVE-2026-21525 [MEDIUM] CWE-476 Windows Remote Access Connection Manager Denial of Service Vulnerability
Windows Remote Access Connection Manager Denial of Service Vulnerability
Description: Null pointer dereference in Windows Remote Access Connection Manager allows an unauthorized attacker to deny service locally.
Windows Remote Access Connection Manager: Windows Remote Access Connection Manager
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Denial of Service
Exploit Status: P
msrc
CVE-2026-21249LOWCVSS 3.32026-02-10
CVE-2026-21249 [LOW] CWE-73 Windows NTLM Spoofing Vulnerability
Windows NTLM Spoofing Vulnerability
Description: External control of file name or path in Windows NTLM allows an unauthorized attacker to perform spoofing locally.
FAQ: According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?
An attacker must send a user a malicious Office file and convince them to open it.
FAQ: According to the CVSS metrics, successful exploitation of this vu
msrc
CVE-2026-20929HIGHCVSS 7.52026-01-13
CVE-2026-20929 [HIGH] CWE-284 Windows HTTP.sys Elevation of Privilege Vulnerability
Windows HTTP.sys Elevation of Privilege Vulnerability
Description: Improper access control in Windows HTTP.sys allows an authorized attacker to elevate privileges over a network.
FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?
The Attack requires an Service Principal Name (SPN) that is registered to an account that no longer exists or is not i
msrc
CVE-2026-20931HIGHCVSS 8.02026-01-13
CVE-2026-20931 [HIGH] CWE-73 Windows Telephony Service Elevation of Privilege Vulnerability
Windows Telephony Service Elevation of Privilege Vulnerability
Description: External control of file name or path in Windows Telephony Service allows an authorized attacker to elevate privileges over an adjacent network.
FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability?
An attacker who successfully exploited this vulnerability could gain SYSTEM privileges
msrc
CVE-2026-20921HIGHCVSS 7.52026-01-13
CVE-2026-20921 [HIGH] CWE-362 Windows SMB Server Elevation of Privilege Vulnerability
Windows SMB Server Elevation of Privilege Vulnerability
Description: Concurrent execution using shared resource with improper synchronization ('race condition') in Windows SMB Server allows an authorized attacker to elevate privileges over a network.
FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?
Successful exploitation of this vulnerabilit
msrc
CVE-2026-20869HIGHCVSS 7.02026-01-13
CVE-2026-20869 [HIGH] CWE-362 Windows Local Session Manager (LSM) Elevation of Privilege Vulnerability
Windows Local Session Manager (LSM) Elevation of Privilege Vulnerability
Description: Concurrent execution using shared resource with improper synchronization ('race condition') in Windows Local Session Manager (LSM) allows an authorized attacker to elevate privileges locally.
FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?
msrc
CVE-2026-20922HIGHCVSS 7.82026-01-13
CVE-2026-20922 [HIGH] CWE-122 Windows NTFS Remote Code Execution Vulnerability
Windows NTFS Remote Code Execution Vulnerability
Description: Heap-based buffer overflow in Windows NTFS allows an authorized attacker to execute code locally.
FAQ: According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution?
The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as A
msrc
CVE-2026-20848HIGHCVSS 7.52026-01-13
CVE-2026-20848 [HIGH] CWE-362 Windows SMB Server Elevation of Privilege Vulnerability
Windows SMB Server Elevation of Privilege Vulnerability
Description: Concurrent execution using shared resource with improper synchronization ('race condition') in Windows SMB Server allows an authorized attacker to elevate privileges over a network.
FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability?
An attacker who successfully exploited this vulnerability coul
msrc
CVE-2026-20919HIGHCVSS 7.52026-01-13
CVE-2026-20919 [HIGH] CWE-362 Windows SMB Server Elevation of Privilege Vulnerability
Windows SMB Server Elevation of Privilege Vulnerability
Description: Concurrent execution using shared resource with improper synchronization ('race condition') in Windows SMB Server allows an authorized attacker to elevate privileges over a network.
FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?
Successful exploitation of this vulnerabilit
msrc
CVE-2026-20809HIGHCVSS 7.82026-01-13
CVE-2026-20809 [HIGH] CWE-367 Windows Kernel Memory Elevation of Privilege Vulnerability
Windows Kernel Memory Elevation of Privilege Vulnerability
Description: Time-of-check time-of-use (toctou) race condition in Windows Kernel Memory allows an authorized attacker to elevate privileges locally.
FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability?
An attacker who successfully exploited this vulnerability could gain Kernel Memory Access.
Windows Ke
msrc
CVE-2026-20940HIGHCVSS 7.82026-01-13
CVE-2026-20940 [HIGH] CWE-822 Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability
Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability
Description: Heap-based buffer overflow in Windows Cloud Files Mini Filter Driver allows an authorized attacker to elevate privileges locally.
FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability?
An attacker who successfully exploited this vulnerability could gain SYSTE
msrc
CVE-2026-20840HIGHCVSS 7.82026-01-13
CVE-2026-20840 [HIGH] CWE-122 Windows NTFS Remote Code Execution Vulnerability
Windows NTFS Remote Code Execution Vulnerability
Description: Heap-based buffer overflow in Windows NTFS allows an authorized attacker to execute code locally.
FAQ: According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution?
The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as A
msrc
CVE-2026-20843HIGHCVSS 7.82026-01-13
CVE-2026-20843 [HIGH] CWE-284 Windows Routing and Remote Access Service (RRAS) Elevation of Privilege Vulnerability
Windows Routing and Remote Access Service (RRAS) Elevation of Privilege Vulnerability
Description: Improper access control in Windows Routing and Remote Access Service (RRAS) allows an authorized attacker to elevate privileges locally.
FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability?
An attacker who successfully exploited this vul
msrc
CVE-2026-20856HIGHCVSS 8.12026-01-13
CVE-2026-20856 [HIGH] CWE-20 Windows Server Update Service (WSUS) Remote Code Execution Vulnerability
Windows Server Update Service (WSUS) Remote Code Execution Vulnerability
Description: Improper input validation in Windows Server Update Service allows an unauthorized attacker to execute code over a network.
FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?
The attacker must inject themselves into the logical network path betw
msrc
CVE-2026-20820HIGHCVSS 7.82026-01-13
CVE-2026-20820 [HIGH] CWE-122 Windows Common Log File System Driver Elevation of Privilege Vulnerability
Windows Common Log File System Driver Elevation of Privilege Vulnerability
Description: Heap-based buffer overflow in Windows Common Log File System Driver allows an authorized attacker to elevate privileges locally.
FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability?
An attacker who successfully exploited this vulnerability could gain SYSTEM p
msrc