Msrc Windows Server 2016 vulnerabilities
4,120 known vulnerabilities affecting msrc/windows_server_2016.
Total CVEs
4,120
CISA KEV
154
actively exploited
Public exploits
204
Exploited in wild
143
Severity breakdown
CRITICAL86HIGH2734MEDIUM1267LOW33
Vulnerabilities
Page 111 of 206
CVE-2022-21961MEDIUMCVSS 6.82022-01-11
CVE-2022-21961 [MEDIUM] Windows Resilient File System (ReFS) Remote Code Execution Vulnerability
Windows Resilient File System (ReFS) Remote Code Execution Vulnerability
FAQ: According to the CVSS metric, the attack vector is physical (AV:P). What does that mean for this vulnerability?
An attacker with physical access to a vulnerable system could insert a specially crafted USB device.
Are there additional attack vectors?
This vulnerability could also be exploited through a local attack vector.
msrc
CVE-2022-21913MEDIUMCVSS 5.32022-01-11
CVE-2022-21913 [MEDIUM] Local Security Authority (Domain Policy) Remote Protocol Security Feature Bypass
Local Security Authority (Domain Policy) Remote Protocol Security Feature Bypass
FAQ: Where can I find more information?
Please see KB5010265 adds AES encryption protections to the MS-LSAD protocol for CVE-2022-21913 for more information about how to protect yourself.
Windows Local Security Authority: Windows Local Security Authority
Microsoft: Microsoft
Customer Action Required: Yes
Imp
msrc
CVE-2022-21915MEDIUMCVSS 6.52022-01-11
CVE-2022-21915 [MEDIUM] Windows GDI+ Information Disclosure Vulnerability
Windows GDI+ Information Disclosure Vulnerability
FAQ: What type of information could be disclosed by this vulnerability?
The type of information that could be disclosed if an attacker successfully exploited this vulnerability is uninitialized memory.
Microsoft Graphics Component: Microsoft Graphics Component
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Information Disclosure
Exploit Status: Publicly Di
msrc
CVE-2022-21900MEDIUMCVSS 4.62022-01-11
CVE-2022-21900 [MEDIUM] Windows Hyper-V Security Feature Bypass Vulnerability
Windows Hyper-V Security Feature Bypass Vulnerability
FAQ: What configurations or versions could be at risk from this vulnerability?
This bypass could affect any Hyper-V configurations that are using Router Guard.
What is the exposure if the vulnerability was bypassed?
Certain packets that would normally be blocked or dropped could be processed. This could allow an attacker to bypass set policy, potentially influencin
msrc
CVE-2022-21838MEDIUMCVSS 5.52022-01-11
CVE-2022-21838 [MEDIUM] Windows Cleanup Manager Elevation of Privilege Vulnerability
Windows Cleanup Manager Elevation of Privilege Vulnerability
FAQ: What privileges could be gained by an attacker who successfully exploited the vulnerability?
An attacker would only be able to delete targeted files on a system. They would not gain privileges to view or modify file contents.
Windows Cleanup Manager: Windows Cleanup Manager
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Elevation
msrc
CVE-2022-21958MEDIUMCVSS 6.82022-01-11
CVE-2022-21958 [MEDIUM] Windows Resilient File System (ReFS) Remote Code Execution Vulnerability
Windows Resilient File System (ReFS) Remote Code Execution Vulnerability
FAQ: According to the CVSS metric, the attack vector is physical (AV:P). What does that mean for this vulnerability?
An attacker with physical access to a vulnerable system could insert a specially crafted USB device.
Are there additional attack vectors?
This vulnerability could also be exploited through a local attack vector.
msrc
CVE-2022-21963MEDIUMCVSS 6.42022-01-11
CVE-2022-21963 [MEDIUM] Windows Resilient File System (ReFS) Remote Code Execution Vulnerability
Windows Resilient File System (ReFS) Remote Code Execution Vulnerability
FAQ: According to the CVSS metric, the attack vector is physical (AV:P). What does that mean for this vulnerability?
An attacker with physical access to a vulnerable system could insert a specially crafted USB device.
Are there additional attack vectors?
This vulnerability could also be exploited through a local attack vector.
msrc
CVE-2022-21928MEDIUMCVSS 6.32022-01-11
CVE-2022-21928 [MEDIUM] Windows Resilient File System (ReFS) Remote Code Execution Vulnerability
Windows Resilient File System (ReFS) Remote Code Execution Vulnerability
FAQ: According to the CVSS metric, the attack vector is physical (AV:P). What does that mean for this vulnerability?
An attacker with physical access to a vulnerable system could insert a specially crafted USB device.
Are there additional attack vectors?
This vulnerability could also be exploited through a local attack vector.
msrc
CVE-2022-21959MEDIUMCVSS 6.82022-01-11
CVE-2022-21959 [MEDIUM] Windows Resilient File System (ReFS) Remote Code Execution Vulnerability
Windows Resilient File System (ReFS) Remote Code Execution Vulnerability
FAQ: According to the CVSS metric, the attack vector is physical (AV:P). What does that mean for this vulnerability?
An attacker with physical access to a vulnerable system could insert a specially crafted USB device.
Are there additional attack vectors?
This vulnerability could also be exploited through a local attack vector.
msrc
CVE-2022-21879MEDIUMCVSS 5.52022-01-11
CVE-2022-21879 [MEDIUM] Windows Kernel Elevation of Privilege Vulnerability
Windows Kernel Elevation of Privilege Vulnerability
Windows Kernel: Windows Kernel
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Elevation of Privilege
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely
Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5009557
Reference: https://suppo
msrc
CVE-2013-3900MEDIUMCVSS 5.5KEV2022-01-11
CVE-2013-3900 [MEDIUM] CWE-347 WinVerifyTrust Signature Validation Vulnerability
WinVerifyTrust Signature Validation Vulnerability
Description: Why is Microsoft republishing a CVE from 2013?
We are republishing CVE-2013-3900 in the Security Update Guide to update the Security Updates table and to inform customers that the EnableCertPaddingCheck is available in all currently supported versions of Windows 10 and Windows 11. While the format is different from the original CVE published in 2013, ex
msrc
CVE-2022-21962MEDIUMCVSS 6.82022-01-11
CVE-2022-21962 [MEDIUM] Windows Resilient File System (ReFS) Remote Code Execution Vulnerability
Windows Resilient File System (ReFS) Remote Code Execution Vulnerability
FAQ: According to the CVSS metric, the attack vector is physical (AV:P). What does that mean for this vulnerability?
An attacker with physical access to a vulnerable system could insert a specially crafted USB device.
Are there additional attack vectors?
This vulnerability could also be exploited through a local attack vector.
msrc
CVE-2022-21960MEDIUMCVSS 6.82022-01-11
CVE-2022-21960 [MEDIUM] Windows Resilient File System (ReFS) Remote Code Execution Vulnerability
Windows Resilient File System (ReFS) Remote Code Execution Vulnerability
FAQ: According to the CVSS metric, the attack vector is physical (AV:P). What does that mean for this vulnerability?
An attacker with physical access to a vulnerable system could insert a specially crafted USB device.
Are there additional attack vectors?
This vulnerability could also be exploited through a local attack vector.
msrc
CVE-2022-21924MEDIUMCVSS 5.32022-01-11
CVE-2022-21924 [MEDIUM] Workstation Service Remote Protocol Security Feature Bypass Vulnerability
Workstation Service Remote Protocol Security Feature Bypass Vulnerability
Windows Workstation Service Remote Protocol: Windows Workstation Service Remote Protocol
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Security Feature Bypass
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely
Re
msrc
CVE-2022-21905MEDIUMCVSS 4.62022-01-11
CVE-2022-21905 [MEDIUM] Windows Hyper-V Security Feature Bypass Vulnerability
Windows Hyper-V Security Feature Bypass Vulnerability
FAQ: What configurations or versions could be at risk from this vulnerability?
This bypass could affect any Hyper-V configurations that are using Router Guard.
What is the exposure if the vulnerability was bypassed?
Certain packets that would normally be blocked or dropped could be processed. This could allow an attacker to bypass set policy, potentially influencin
msrc
CVE-2022-21894MEDIUMCVSS 4.4Exploited2022-01-11
CVE-2022-21894 [MEDIUM] Secure Boot Security Feature Bypass Vulnerability
Secure Boot Security Feature Bypass Vulnerability
Windows Secure Boot: Windows Secure Boot
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Security Feature Bypass
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely
Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5009557
Reference: https:
msrc
CVE-2022-21892MEDIUMCVSS 6.82022-01-11
CVE-2022-21892 [MEDIUM] Windows Resilient File System (ReFS) Remote Code Execution Vulnerability
Windows Resilient File System (ReFS) Remote Code Execution Vulnerability
FAQ: According to the CVSS metric, the attack vector is physical (AV:P). What does that mean for this vulnerability?
An attacker with physical access to a vulnerable system could insert a specially crafted USB device.
Are there additional attack vectors?
This vulnerability could also be exploited through a local attack vector.
msrc
CVE-2021-43215CRITICALCVSS 9.82021-12-14
CVE-2021-43215 [CRITICAL] iSNS Server Memory Corruption Vulnerability Can Lead to Remote Code Execution
iSNS Server Memory Corruption Vulnerability Can Lead to Remote Code Execution
FAQ: How could an attacker exploit this vulnerability?
An attacker could send a specially crafted request to the Internet Storage Name Service (iSNS) server, which could result in remote code execution.
FAQ: What is Windows iSNS?
The Internet Storage Name Service (iSNS) protocol is used for interaction between iSNS
msrc
CVE-2021-43223HIGHCVSS 7.82021-12-14
CVE-2021-43223 [HIGH] Windows Remote Access Connection Manager Elevation of Privilege Vulnerability
Windows Remote Access Connection Manager Elevation of Privilege Vulnerability
Windows Remote Access Connection Manager: Windows Remote Access Connection Manager
Microsoft: Microsoft
Impact: Elevation of Privilege
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A
Reference: https://catalog
msrc
CVE-2021-43893HIGHCVSS 7.52021-12-14
CVE-2021-43893 [HIGH] Windows Encrypting File System (EFS) Elevation of Privilege Vulnerability
Windows Encrypting File System (EFS) Elevation of Privilege Vulnerability
Windows Encrypting File System (EFS): Windows Encrypting File System (EFS)
Microsoft: Microsoft
Impact: Elevation of Privilege
Exploit Status: Publicly Disclosed:Yes;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A
Reference: https://catalog.update.microso
msrc