Msrc Windows Server 2012 R2 vulnerabilities
3,441 known vulnerabilities affecting msrc/windows_server_2012_r2.
Total CVEs
3,441
CISA KEV
141
actively exploited
Public exploits
207
Exploited in wild
131
Severity breakdown
CRITICAL86HIGH2272MEDIUM1047LOW36
Vulnerabilities
Page 31 of 173
CVE-2024-49046HIGHCVSS 7.82024-11-12
CVE-2024-49046 [HIGH] CWE-367 Windows Win32 Kernel Subsystem Elevation of Privilege Vulnerability
Windows Win32 Kernel Subsystem Elevation of Privilege Vulnerability
FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability?
An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.
Windows Win32 Kernel Subsystem: Windows Win32 Kernel Subsystem
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Elevation of Privile
msrc
CVE-2024-43628HIGHCVSS 8.82024-11-12
CVE-2024-43628 [HIGH] CWE-190 Windows Telephony Service Remote Code Execution Vulnerability
Windows Telephony Service Remote Code Execution Vulnerability
FAQ: According to the CVSS metric, the attack vector is network (AV:N) and the user interaction is required (UI:R). What is the target context of the remote code execution?
This attack requires a client to connect to a malicious server, and that could allow the attacker to gain code execution on the client.
FAQ: How could an attacker exploit
msrc
CVE-2024-49019HIGHCVSS 7.82024-11-12
CVE-2024-49019 [HIGH] CWE-1390 Active Directory Certificate Services Elevation of Privilege Vulnerability
Active Directory Certificate Services Elevation of Privilege Vulnerability
FAQ: What privileges could be gained by an attacker who successfully exploited the vulnerability?
An attacker who successfully exploited this vulnerability could gain domain administrator privileges.
FAQ: What types of certificates are vulnerable to this type of attack?
Certificates created using a version 1 certifi
msrc
CVE-2024-43635HIGHCVSS 8.82024-11-12
CVE-2024-43635 [HIGH] CWE-190 Windows Telephony Service Remote Code Execution Vulnerability
Windows Telephony Service Remote Code Execution Vulnerability
FAQ: According to the CVSS metric, the attack vector is network (AV:N) and the user interaction is required (UI:R). What is the target context of the remote code execution?
This attack requires a client to connect to a malicious server, and that could allow the attacker to gain code execution on the client.
FAQ: How could an attacker exploit
msrc
CVE-2024-43450HIGHCVSS 7.52024-11-12
CVE-2024-43450 [HIGH] CWE-924 Windows DNS Spoofing Vulnerability
Windows DNS Spoofing Vulnerability
FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?
The attacker must inject themselves into the logical network path between the target and the resource requested by the victim to read or modify network communications. This is called a machine-in-the-middle (MITM) attack.
FAQ: According to the CVSS metric, user interaction is requ
msrc
CVE-2024-43636HIGHCVSS 7.82024-11-12
CVE-2024-43636 [HIGH] CWE-822 Win32k Elevation of Privilege Vulnerability
Win32k Elevation of Privilege Vulnerability
FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability?
An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.
Windows DWM Core Library: Windows DWM Core Library
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Elevation of Privilege
Exploit Status: Publicly Disclosed:No;Exploited:No;Lates
msrc
CVE-2024-43643MEDIUMCVSS 6.82024-11-12
CVE-2024-43643 [MEDIUM] CWE-125 Windows USB Video Class System Driver Elevation of Privilege Vulnerability
Windows USB Video Class System Driver Elevation of Privilege Vulnerability
FAQ: According to the CVSS metric, the attack vector is physical (AV:P). What does that mean for this vulnerability?
To exploit this vulnerability, an unauthenticated attacker needs to physically connect a malicious USB device to the victim's machine.
FAQ: What privileges could be gained by an attacker who successf
msrc
CVE-2024-43638MEDIUMCVSS 6.82024-11-12
CVE-2024-43638 [MEDIUM] CWE-125 Windows USB Video Class System Driver Elevation of Privilege Vulnerability
Windows USB Video Class System Driver Elevation of Privilege Vulnerability
FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability?
An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.
FAQ: According to the CVSS metric, the attack vector is physical (AV:P). What does that mean for this vulnerability?
To exploit t
msrc
CVE-2024-38203MEDIUMCVSS 6.22024-11-12
CVE-2024-38203 [MEDIUM] CWE-693 Windows Package Library Manager Information Disclosure Vulnerability
Windows Package Library Manager Information Disclosure Vulnerability
FAQ: What type of information could be disclosed by this vulnerability?
The type of information that could be disclosed if an attacker successfully exploited this vulnerability is secrets or privileged information belonging to the user of the affected application.
Windows Package Library Manager: Windows Package Library Manage
msrc
CVE-2024-43637MEDIUMCVSS 6.82024-11-12
CVE-2024-43637 [MEDIUM] CWE-125 Windows USB Video Class System Driver Elevation of Privilege Vulnerability
Windows USB Video Class System Driver Elevation of Privilege Vulnerability
FAQ: According to the CVSS metric, the attack vector is physical (AV:P). What does that mean for this vulnerability?
To exploit this vulnerability, an unauthenticated attacker needs to physically connect a malicious USB device to the victim's machine.
FAQ: What privileges could be gained by an attacker who successf
msrc
CVE-2024-43451MEDIUMCVSS 6.5KEV2024-11-12
CVE-2024-43451 [MEDIUM] CWE-73 NTLM Hash Disclosure Spoofing Vulnerability
NTLM Hash Disclosure Spoofing Vulnerability
FAQ: According to the CVSS metric, successful exploitation of this vulnerability could lead to total loss of confidentiality (C:H)? What does that mean for this vulnerability?
This vulnerability discloses a user's NTLMv2 hash to the attacker who could use this to authenticate as the user.
FAQ: According to the CVSS metric, user interaction is required (UI:R). What interaction
msrc
CVE-2024-43449MEDIUMCVSS 6.82024-11-12
CVE-2024-43449 [MEDIUM] CWE-125 Windows USB Video Class System Driver Elevation of Privilege Vulnerability
Windows USB Video Class System Driver Elevation of Privilege Vulnerability
FAQ: According to the CVSS metric, the attack vector is physical (AV:P). What does that mean for this vulnerability?
To exploit this vulnerability, an unauthenticated attacker needs to physically connect a malicious USB device to the victim's machine.
FAQ: What privileges could be gained by an attacker who successf
msrc
CVE-2024-43634MEDIUMCVSS 6.82024-11-12
CVE-2024-43634 [MEDIUM] CWE-125 Windows USB Video Class System Driver Elevation of Privilege Vulnerability
Windows USB Video Class System Driver Elevation of Privilege Vulnerability
FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability?
An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.
FAQ: According to the CVSS metric, the attack vector is physical (AV:P). What does that mean for this vulnerability?
To exploit t
msrc
CVE-2024-38124CRITICALCVSS 9.02024-10-08
CVE-2024-38124 [CRITICAL] CWE-287 Windows Netlogon Elevation of Privilege Vulnerability
Windows Netlogon Elevation of Privilege Vulnerability
FAQ: What privileges could be gained by an attacker who successfully exploited the vulnerability?
An attacker who successfully exploited this vulnerability could gain domain administrator privileges.
FAQ: According to the CVSS metric, the attack vector is adjacent (AV:A). What does that mean for this vulnerability?
An authenticated attacker could exploit
msrc
CVE-2024-43517HIGHCVSS 8.82024-10-08
CVE-2024-43517 [HIGH] CWE-122 Microsoft ActiveX Data Objects Remote Code Execution Vulnerability
Microsoft ActiveX Data Objects Remote Code Execution Vulnerability
FAQ: According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?
An attacker must send the user a malicious file and convince them to open it.
FAQ: According to the CVSS metric, the attack vector is network (AV:N) and the user interaction is required (UI:R). What is the target conte
msrc
CVE-2024-43611HIGHCVSS 8.82024-10-08
CVE-2024-43611 [HIGH] CWE-20 Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
FAQ: How could an attacker exploit this vulnerability?
An attacker who successfully exploited this vulnerability could gain remote code execution (RCE) on the victim's machine.
FAQ: How could an attacker exploit this vulnerability?
An unauthenticated attacker could send a specially crafted protocol
msrc
CVE-2024-38265HIGHCVSS 8.82024-10-08
CVE-2024-38265 [HIGH] CWE-20 Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
FAQ: According to the CVSS metric, the attack vector is network (AV:N) and the user interaction is required (UI:R). What is the target context of the remote code execution?
This attack requires an admin user on the client to connect to a malicious server, and that could allow the attacker to gain co
msrc
CVE-2024-43506HIGHCVSS 7.52024-10-08
CVE-2024-43506 [HIGH] CWE-400 BranchCache Denial of Service Vulnerability
BranchCache Denial of Service Vulnerability
BranchCache: BranchCache
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Denial of Service
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely
Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5044277
Reference: https://support.microsoft.com/help/5044277
Reference: https://catalog.update.micr
msrc
CVE-2024-38262HIGHCVSS 7.52024-10-08
CVE-2024-38262 [HIGH] CWE-591 Windows Remote Desktop Licensing Service Remote Code Execution Vulnerability
Windows Remote Desktop Licensing Service Remote Code Execution Vulnerability
FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?
Successful exploitation of this vulnerability requires an attacker to win a race condition.
FAQ: According to the CVSS metric, privileges required is low (PR:L). What does that mean for this vulner
msrc
CVE-2024-43599HIGHCVSS 8.82024-10-08
CVE-2024-43599 [HIGH] CWE-416 Remote Desktop Client Remote Code Execution Vulnerability
Remote Desktop Client Remote Code Execution Vulnerability
FAQ: How could an attacker exploit this vulnerability?
In the case of a Remote Desktop connection, an attacker with control of a Remote Desktop Server could trigger a remote code execution (RCE) on the RDP client machine when a victim connects to the attacking server with the vulnerable Remote Desktop Client.
Remote Desktop Client: Remote Desktop Cli
msrc