Msrc Windows Server 2016 vulnerabilities

4,120 known vulnerabilities affecting msrc/windows_server_2016.

Total CVEs
4,120
CISA KEV
154
actively exploited
Public exploits
204
Exploited in wild
143
Severity breakdown
CRITICAL86HIGH2734MEDIUM1267LOW33

Vulnerabilities

Page 28 of 206
CVE-2025-24056HIGHCVSS 8.82025-03-11
CVE-2025-24056 [HIGH] CWE-122 Windows Telephony Service Remote Code Execution Vulnerability Windows Telephony Service Remote Code Execution Vulnerability Description: Heap-based buffer overflow in Windows Telephony Server allows an unauthorized attacker to execute code over a network. FAQ: According to the CVSS metric, the attack vector is network (AV:N) and the user interaction is required (UI:R). What is the target context of the remote code execution? This attack requires a client to connec
msrc
CVE-2025-26634HIGHCVSS 7.52025-03-11
CVE-2025-26634 [HIGH] CWE-122 Windows Core Messaging Elevation of Privileges Vulnerability Windows Core Messaging Elevation of Privileges Vulnerability Description: Heap-based buffer overflow in Windows Core Messaging allows an authorized attacker to elevate privileges over a network. FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability? Successful exploitation of this vulnerability requires an attacker to gather information specif
msrc
CVE-2025-24985HIGHCVSS 7.8KEV2025-03-11
CVE-2025-24985 [HIGH] CWE-190 Windows Fast FAT File System Driver Remote Code Execution Vulnerability Windows Fast FAT File System Driver Remote Code Execution Vulnerability Description: Integer overflow or wraparound in Windows Fast FAT Driver allows an unauthorized attacker to execute code locally. FAQ: According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution? The word Remote in the title refers to the location of t
msrc
CVE-2025-24067HIGHCVSS 7.82025-03-11
CVE-2025-24067 [HIGH] CWE-122 Kernel Streaming Service Driver Elevation of Privilege Vulnerability Kernel Streaming Service Driver Elevation of Privilege Vulnerability Description: Heap-based buffer overflow in Microsoft Streaming Service allows an authorized attacker to elevate privileges locally. FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. Microsoft
msrc
CVE-2025-24048HIGHCVSS 7.82025-03-11
CVE-2025-24048 [HIGH] CWE-122 Windows Hyper-V Elevation of Privilege Vulnerability Windows Hyper-V Elevation of Privilege Vulnerability Description: Heap-based buffer overflow in Role: Windows Hyper-V allows an authorized attacker to elevate privileges locally. FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain Kernel Memory Access. Role: Windows Hyper-V: Role: Windows Hyper-V
msrc
CVE-2025-24072HIGHCVSS 7.82025-03-11
CVE-2025-24072 [HIGH] CWE-416 Microsoft Local Security Authority (LSA) Server Elevation of Privilege Vulnerability Microsoft Local Security Authority (LSA) Server Elevation of Privilege Vulnerability Description: Use after free in Microsoft Local Security Authority Server (lsasrv) allows an authorized attacker to elevate privileges locally. FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerabilit
msrc
CVE-2025-24035HIGHCVSS 8.12025-03-11
CVE-2025-24035 [HIGH] CWE-591 Windows Remote Desktop Services Remote Code Execution Vulnerability Windows Remote Desktop Services Remote Code Execution Vulnerability Description: Sensitive data storage in improperly locked memory in Windows Remote Desktop Services allows an unauthorized attacker to execute code over a network. FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability? Successful exploitation of this vulnerability requir
msrc
CVE-2025-24059HIGHCVSS 7.82025-03-11
CVE-2025-24059 [HIGH] CWE-681 Windows Common Log File System Driver Elevation of Privilege Vulnerability Windows Common Log File System Driver Elevation of Privilege Vulnerability Description: Incorrect conversion between numeric types in Windows Common Log File System Driver allows an authorized attacker to elevate privileges locally. FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability cou
msrc
CVE-2025-24051HIGHCVSS 8.82025-03-11
CVE-2025-24051 [HIGH] CWE-122 Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability Description: Heap-based buffer overflow in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to execute code over a network. FAQ: According to the CVSS metric, the attack vector is network (AV:N) and the user interaction is required (UI:R). What is the target context
msrc
CVE-2025-25008HIGHCVSS 7.12025-03-11
CVE-2025-25008 [HIGH] CWE-59 Windows Server Elevation of Privilege Vulnerability Windows Server Elevation of Privilege Vulnerability Description: Improper link resolution before file access ('link following') in Microsoft Windows allows an authorized attacker to elevate privileges locally. FAQ: What privileges could be gained by an attacker who successfully exploited the vulnerability? An attacker would be able to delete targeted files on a system. FAQ: According to the CVSS metrics, successf
msrc
CVE-2025-24066HIGHCVSS 7.82025-03-11
CVE-2025-24066 [HIGH] CWE-122 Kernel Streaming Service Driver Elevation of Privilege Vulnerability Kernel Streaming Service Driver Elevation of Privilege Vulnerability Description: Heap-based buffer overflow in Windows Kernel-Mode Drivers allows an authorized attacker to elevate privileges locally. FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. Windows Ke
msrc
CVE-2025-24044HIGHCVSS 7.82025-03-11
CVE-2025-24044 [HIGH] CWE-416 Windows Win32 Kernel Subsystem Elevation of Privilege Vulnerability Windows Win32 Kernel Subsystem Elevation of Privilege Vulnerability Description: Use after free in Windows Win32 Kernel Subsystem allows an authorized attacker to elevate privileges locally. FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. Windows Win32 Kernel
msrc
CVE-2025-24064HIGHCVSS 8.12025-03-11
CVE-2025-24064 [HIGH] CWE-416 Windows Domain Name Service Remote Code Execution Vulnerability Windows Domain Name Service Remote Code Execution Vulnerability Description: Use after free in DNS Server allows an unauthorized attacker to execute code over a network. FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability? Successful exploitation of this vulnerability requires an attacker to win a race condition. FAQ: How could an attac
msrc
CVE-2025-24061HIGHCVSS 7.82025-03-11
CVE-2025-24061 [HIGH] CWE-693 Windows Mark of the Web Security Feature Bypass Vulnerability Windows Mark of the Web Security Feature Bypass Vulnerability Description: Protection mechanism failure in Windows Mark of the Web (MOTW) allows an unauthorized attacker to bypass a security feature locally. FAQ: How could an attacker exploit the vulnerability? In a web-based attack scenario, an attacker could host a malicious website that is designed to exploit the security feature bypass. In an email
msrc
CVE-2025-21180HIGHCVSS 7.82025-03-11
CVE-2025-21180 [HIGH] CWE-122 Windows exFAT File System Remote Code Execution Vulnerability Windows exFAT File System Remote Code Execution Vulnerability Description: Heap-based buffer overflow in Windows exFAT File System allows an unauthorized attacker to execute code locally. FAQ: According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution? The word Remote in the title refers to the location of the attacker. This type
msrc
CVE-2025-24046HIGHCVSS 7.82025-03-11
CVE-2025-24046 [HIGH] CWE-416 Kernel Streaming Service Driver Elevation of Privilege Vulnerability Kernel Streaming Service Driver Elevation of Privilege Vulnerability Description: Use after free in Microsoft Streaming Service allows an authorized attacker to elevate privileges locally. FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. Microsoft Streaming Se
msrc
CVE-2025-24995HIGHCVSS 7.82025-03-11
CVE-2025-24995 [HIGH] CWE-122 Kernel Streaming WOW Thunk Service Driver Elevation of Privilege Vulnerability Kernel Streaming WOW Thunk Service Driver Elevation of Privilege Vulnerability Description: Heap-based buffer overflow in Kernel Streaming WOW Thunk Service Driver allows an authorized attacker to elevate privileges locally. FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could g
msrc
CVE-2025-24983HIGHCVSS 7.0KEV2025-03-11
CVE-2025-24983 [HIGH] CWE-416 Windows Win32 Kernel Subsystem Elevation of Privilege Vulnerability Windows Win32 Kernel Subsystem Elevation of Privilege Vulnerability Description: Use after free in Windows Win32 Kernel Subsystem allows an authorized attacker to elevate privileges locally. FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability? Successful exploitation of this vulnerability requires an attacker to win a race condition.
msrc
CVE-2025-24993HIGHCVSS 7.8KEV2025-03-11
CVE-2025-24993 [HIGH] CWE-122 Windows NTFS Remote Code Execution Vulnerability Windows NTFS Remote Code Execution Vulnerability Description: Heap-based buffer overflow in Windows NTFS allows an unauthorized attacker to execute code locally. FAQ: According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution? The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as
msrc
CVE-2025-26633HIGHCVSS 7.0KEVPoC2025-03-11
CVE-2025-26633 [HIGH] CWE-707 Microsoft Management Console Security Feature Bypass Vulnerability Microsoft Management Console Security Feature Bypass Vulnerability Description: Improper neutralization in Microsoft Management Console allows an unauthorized attacker to bypass a security feature locally. FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability? Successful exploitation of this vulnerability requires an attacker to take add
msrc