Msrc Windows Server 2016 vulnerabilities
4,120 known vulnerabilities affecting msrc/windows_server_2016.
Total CVEs
4,120
CISA KEV
154
actively exploited
Public exploits
204
Exploited in wild
143
Severity breakdown
CRITICAL86HIGH2734MEDIUM1267LOW33
Vulnerabilities
Page 101 of 206
CVE-2022-29129HIGHCVSS 8.82022-05-10
CVE-2022-29129 [HIGH] Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability
Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability
FAQ: How could an attacker exploit this vulnerability?
This vulnerability could be exploited over the network by an authenticated attacker through a low complexity attack on a server configured as the domain controller.
Windows LDAP - Lightweight Directory Access Protocol: Windows LDAP - Lightweig
msrc
CVE-2022-29141HIGHCVSS 8.82022-05-10
CVE-2022-29141 [HIGH] Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability
Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability
Windows LDAP - Lightweight Directory Access Protocol: Windows LDAP - Lightweight Directory Access Protocol
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Remote Code Execution
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older S
msrc
CVE-2022-29135HIGHCVSS 7.02022-05-10
CVE-2022-29135 [HIGH] Windows Cluster Shared Volume (CSV) Elevation of Privilege Vulnerability
Windows Cluster Shared Volume (CSV) Elevation of Privilege Vulnerability
FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?
Successful exploitation of this vulnerability requires an attacker to win a race condition.
Windows Cluster Shared Volume (CSV): Windows Cluster Shared Volume (CSV)
Microsoft: Microsoft
Customer Action Required:
msrc
CVE-2022-29103HIGHCVSS 7.82022-05-10
CVE-2022-29103 [HIGH] Windows Remote Access Connection Manager Elevation of Privilege Vulnerability
Windows Remote Access Connection Manager Elevation of Privilege Vulnerability
Windows Remote Access Connection Manager: Windows Remote Access Connection Manager
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Elevation of Privilege
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely
Ref
msrc
CVE-2022-21972HIGHCVSS 8.12022-05-10
CVE-2022-21972 [HIGH] Windows Point-to-Point Tunneling Protocol Remote Code Execution Vulnerability
Windows Point-to-Point Tunneling Protocol Remote Code Execution Vulnerability
FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?
Successful exploitation of this vulnerability requires an attacker to win a race condition.
FAQ: How could an attacker exploit this vulnerability?
An unauthenticated attacker could send a specially craft
msrc
CVE-2022-29126HIGHCVSS 7.02022-05-10
CVE-2022-29126 [HIGH] Tablet Windows User Interface Application Core Elevation of Privilege Vulnerability
Tablet Windows User Interface Application Core Elevation of Privilege Vulnerability
FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?
Successful exploitation of this vulnerability requires an attacker to win a race condition.
Tablet Windows User Interface: Tablet Windows User Interface
Microsoft: Microsoft
Customer Action
msrc
CVE-2022-23270HIGHCVSS 8.12022-05-10
CVE-2022-23270 [HIGH] Windows Point-to-Point Tunneling Protocol Remote Code Execution Vulnerability
Windows Point-to-Point Tunneling Protocol Remote Code Execution Vulnerability
FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?
Successful exploitation of this vulnerability requires an attacker to win a race condition.
FAQ: How could an attacker exploit this vulnerability?
An unauthenticated attacker could send a specially craft
msrc
CVE-2022-22013HIGHCVSS 8.82022-05-10
CVE-2022-22013 [HIGH] Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability
Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability
Windows LDAP - Lightweight Directory Access Protocol: Windows LDAP - Lightweight Directory Access Protocol
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Remote Code Execution
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older S
msrc
CVE-2022-26938HIGHCVSS 7.02022-05-10
CVE-2022-26938 [HIGH] Storage Spaces Direct Elevation of Privilege Vulnerability
Storage Spaces Direct Elevation of Privilege Vulnerability
FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?
Successful exploitation of this vulnerability requires an attacker to win a race condition.
Windows Storage Spaces Controller: Windows Storage Spaces Controller
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Elevation of Privi
msrc
CVE-2022-26925HIGHCVSS 8.1KEV2022-05-10
CVE-2022-26925 [HIGH] Windows LSA Spoofing Vulnerability
Windows LSA Spoofing Vulnerability
FAQ: How could an attacker exploit this vulnerability?
An unauthenticated attacker could call a method on the LSARPC interface and coerce the domain controller to authenticate to the attacker using NTLM. This security update detects anonymous connection attempts in LSARPC and disallows it.
Is there more information available on how to protect my system?
Yes. Please see ADV210003 Mitigating NTLM Relay Att
msrc
CVE-2022-29128HIGHCVSS 8.82022-05-10
CVE-2022-29128 [HIGH] Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability
Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability
FAQ: How could an attacker exploit this vulnerability?
This vulnerability could be exploited over the network by an authenticated attacker through a low complexity attack on a server configured as the domain controller.
Windows LDAP - Lightweight Directory Access Protocol: Windows LDAP - Lightweig
msrc
CVE-2022-29137HIGHCVSS 8.82022-05-10
CVE-2022-29137 [HIGH] Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability
Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability
Windows LDAP - Lightweight Directory Access Protocol: Windows LDAP - Lightweight Directory Access Protocol
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Remote Code Execution
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older S
msrc
CVE-2022-26933MEDIUMCVSS 5.52022-05-10
CVE-2022-26933 [MEDIUM] Windows NTFS Information Disclosure Vulnerability
Windows NTFS Information Disclosure Vulnerability
FAQ: What type of information could be disclosed by this vulnerability?
Exploiting this vulnerability could allow the disclosure of certain kernel memory content.
Windows NTFS: Windows NTFS
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Information Disclosure
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likel
msrc
CVE-2022-29140MEDIUMCVSS 5.52022-05-10
CVE-2022-29140 [MEDIUM] Windows Print Spooler Information Disclosure Vulnerability
Windows Print Spooler Information Disclosure Vulnerability
FAQ: What type of information could be disclosed by this vulnerability?
The type of information that could be disclosed if an attacker successfully exploited this vulnerability is unauthorized file system access - reading from the file system.
Windows Print Spooler Components: Windows Print Spooler Components
Microsoft: Microsoft
Customer Action Requir
msrc
CVE-2022-29122MEDIUMCVSS 6.52022-05-10
CVE-2022-29122 [MEDIUM] Windows Clustered Shared Volume Information Disclosure Vulnerability
Windows Clustered Shared Volume Information Disclosure Vulnerability
FAQ: According to the CVSS metric, successful exploitation could lead to a scope change (S:C). What does this mean for this vulnerability?
In this case, a successful attack could be performed from a low privilege AppContainer. The attacker could elevate their privileges and execute code or access resources at a higher integrity level t
msrc
CVE-2022-29114MEDIUMCVSS 5.52022-05-10
CVE-2022-29114 [MEDIUM] Windows Print Spooler Information Disclosure Vulnerability
Windows Print Spooler Information Disclosure Vulnerability
FAQ: What type of information could be disclosed by this vulnerability?
The type of information that could be disclosed if an attacker successfully exploited this vulnerability is unauthorized file system access - reading from the file system.
Windows Print Spooler Components: Windows Print Spooler Components
Microsoft: Microsoft
Customer Action Requir
msrc
CVE-2022-29134MEDIUMCVSS 6.52022-05-10
CVE-2022-29134 [MEDIUM] Windows Clustered Shared Volume Information Disclosure Vulnerability
Windows Clustered Shared Volume Information Disclosure Vulnerability
FAQ: What type of information could be disclosed by this vulnerability?
The type of information that could be disclosed if an attacker successfully exploited this vulnerability is the contents of Kernel memory. An attacker could read the contents of Kernel memory from a user mode process.
FAQ: According to the CVSS metric, successful
msrc
CVE-2022-26935MEDIUMCVSS 6.52022-05-10
CVE-2022-26935 [MEDIUM] Windows WLAN AutoConfig Service Information Disclosure Vulnerability
Windows WLAN AutoConfig Service Information Disclosure Vulnerability
FAQ: According to the CVSS metric, the attack vector is adjacent (AV:A). What does that mean for this vulnerability?
This vulnerability's attack is limited at the protocol level to a logically adjacent topology. This means it cannot simply be done across the internet, but instead needs something specific tied to the target. Good exampl
msrc
CVE-2022-24466MEDIUMCVSS 4.12022-05-10
CVE-2022-24466 [MEDIUM] Windows Hyper-V Security Feature Bypass Vulnerability
Windows Hyper-V Security Feature Bypass Vulnerability
FAQ: What kind of security feature could be bypassed by successfully exploiting this vulnerability?
This Hyper-V vulnerability relates to a Virtual Machine Switch with virtual networking in Hyper-V Network Virtualization (HNV). It might be possible to bypass extended ACLs and other Windows security feature checks.
See Create Security Policies with Extended Port Acc
msrc
CVE-2022-29120MEDIUMCVSS 6.52022-05-10
CVE-2022-29120 [MEDIUM] Windows Clustered Shared Volume Information Disclosure Vulnerability
Windows Clustered Shared Volume Information Disclosure Vulnerability
FAQ: According to the CVSS metric, successful exploitation could lead to a scope change (S:C). What does this mean for this vulnerability?
In this case, a successful attack could be performed from a low privilege AppContainer. The attacker could elevate their privileges and execute code or access resources at a higher integrity level t
msrc