Msrc Windows Server 2016 vulnerabilities
4,120 known vulnerabilities affecting msrc/windows_server_2016.
Total CVEs
4,120
CISA KEV
154
actively exploited
Public exploits
204
Exploited in wild
143
Severity breakdown
CRITICAL86HIGH2734MEDIUM1267LOW33
Vulnerabilities
Page 40 of 206
CVE-2024-43599HIGHCVSS 8.82024-10-08
CVE-2024-43599 [HIGH] CWE-416 Remote Desktop Client Remote Code Execution Vulnerability
Remote Desktop Client Remote Code Execution Vulnerability
FAQ: How could an attacker exploit this vulnerability?
In the case of a Remote Desktop connection, an attacker with control of a Remote Desktop Server could trigger a remote code execution (RCE) on the RDP client machine when a victim connects to the attacking server with the vulnerable Remote Desktop Client.
Remote Desktop Client: Remote Desktop Cli
msrc
CVE-2024-43509HIGHCVSS 7.82024-10-08
CVE-2024-43509 [HIGH] CWE-416 Windows Graphics Component Elevation of Privilege Vulnerability
Windows Graphics Component Elevation of Privilege Vulnerability
FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability?
An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.
Microsoft Graphics Component: Microsoft Graphics Component
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Elevation of Privilege
Exploit
msrc
CVE-2024-43607HIGHCVSS 8.82024-10-08
CVE-2024-43607 [HIGH] CWE-122 Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
FAQ: According to the CVSS metric, the attack vector is network (AV:N) and the user interaction is required (UI:R). What is the target context of the remote code execution?
This attack requires an admin user on the client to connect to a malicious server, and that could allow the attacker to gain c
msrc
CVE-2024-43553HIGHCVSS 7.42024-10-08
CVE-2024-43553 [HIGH] CWE-822 NT OS Kernel Elevation of Privilege Vulnerability
NT OS Kernel Elevation of Privilege Vulnerability
FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability?
An attacker who successfully exploited this vulnerability could gain Kernel Memory Access.
FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?
Successful exploitation of this vulnerability requires an att
msrc
CVE-2024-43550HIGHCVSS 7.42024-10-08
CVE-2024-43550 [HIGH] CWE-295 Windows Secure Channel Spoofing Vulnerability
Windows Secure Channel Spoofing Vulnerability
FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?
The attacker must inject themselves into the logical network path between the target and the resource requested by the victim to read or modify network communications. This is called a machine-in-the-middle (MITM) attack.
FAQ: According to the CVSS metrics, s
msrc
CVE-2024-43565HIGHCVSS 7.52024-10-08
CVE-2024-43565 [HIGH] CWE-125 Windows Network Address Translation (NAT) Denial of Service Vulnerability
Windows Network Address Translation (NAT) Denial of Service Vulnerability
Windows Network Address Translation (NAT): Windows Network Address Translation (NAT)
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Denial of Service
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely
Reference: https://catalog.update.microsoft.com/v7/sit
msrc
CVE-2024-43564HIGHCVSS 8.82024-10-08
CVE-2024-43564 [HIGH] CWE-122 Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
FAQ: How could an attacker exploit this vulnerability?
An attacker could exploit this vulnerability by tricking a user into sending a request to a malicious server. This could result in the server returning malicious data that might cause arbitrary code execution on the user's system.
FAQ: Accordi
msrc
CVE-2024-38261HIGHCVSS 7.82024-10-08
CVE-2024-38261 [HIGH] CWE-20 Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
FAQ: According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution?
The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack
msrc
CVE-2024-43516HIGHCVSS 7.82024-10-08
CVE-2024-43516 [HIGH] CWE-822 Windows Secure Kernel Mode Elevation of Privilege Vulnerability
Windows Secure Kernel Mode Elevation of Privilege Vulnerability
FAQ: Are there additional actions I need to take after installing November 12, 2024 update?
This update affects a component of Virtualization-based Security (VBS). The policy mitigations described in KB5042562: Guidance for blocking rollback of Virtualization-based Security (VBS) related security updates - Microsoft Support have been updat
msrc
CVE-2024-43535HIGHCVSS 7.02024-10-08
CVE-2024-43535 [HIGH] CWE-416 Windows Kernel-Mode Driver Elevation of Privilege Vulnerability
Windows Kernel-Mode Driver Elevation of Privilege Vulnerability
FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability?
An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.
FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?
Successful exploitation of this vuln
msrc
CVE-2024-43511HIGHCVSS 7.02024-10-08
CVE-2024-43511 [HIGH] CWE-367 Windows Kernel Elevation of Privilege Vulnerability
Windows Kernel Elevation of Privilege Vulnerability
FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability?
An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.
FAQ: Are there additional actions I need to take after installing November 12, 2024 update?
This update affects a component of Virtualization-based Security (VBS). The policy mi
msrc
CVE-2024-43541HIGHCVSS 7.52024-10-08
CVE-2024-43541 [HIGH] CWE-400 Microsoft Simple Certificate Enrollment Protocol Denial of Service Vulnerability
Microsoft Simple Certificate Enrollment Protocol Denial of Service Vulnerability
Microsoft Simple Certificate Enrollment Protocol: Microsoft Simple Certificate Enrollment Protocol
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Denial of Service
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely
Reference: https://catalog
msrc
CVE-2024-43453HIGHCVSS 8.82024-10-08
CVE-2024-43453 [HIGH] CWE-122 Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
FAQ: How could an attacker exploit this vulnerability?
An attacker could exploit this vulnerability by tricking a user into sending a request to a malicious server. This could result in the server returning malicious data that might cause arbitrary code execution on the user's system.
FAQ: How cou
msrc
CVE-2024-43518HIGHCVSS 8.82024-10-08
CVE-2024-43518 [HIGH] CWE-122 Windows Telephony Server Remote Code Execution Vulnerability
Windows Telephony Server Remote Code Execution Vulnerability
FAQ: According to the CVSS metric, user interaction is required (UI:R) and privileges required are none (PR:N). What does that mean for this vulnerability?
An unauthorized attacker must wait for a user to initiate a connection.
FAQ: According to the CVSS metric, the attack vector is network (AV:N) and the user interaction is required (UI:R). Wh
msrc
CVE-2024-30092HIGHCVSS 8.02024-10-08
CVE-2024-30092 [HIGH] CWE-20 Windows Hyper-V Remote Code Execution Vulnerability
Windows Hyper-V Remote Code Execution Vulnerability
FAQ: Under what circumstances might this vulnerability be exploited other than as a denial of service attack against a Hyper-V host?
This issue allows a guest VM to force the Hyper-V host's kernel to read from an arbitrary, potentially invalid address. The contents of the address read would not be returned to the guest VM. In most circumstances, this would result
msrc
CVE-2024-38212HIGHCVSS 8.82024-10-08
CVE-2024-38212 [HIGH] CWE-122 Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
FAQ: According to the CVSS metric, the attack vector is network (AV:N) and the user interaction is required (UI:R). What is the target context of the remote code execution?
This attack requires an admin user on the client to connect to a malicious server, and that could allow the attacker to gain c
msrc
CVE-2024-43521HIGHCVSS 7.52024-10-08
CVE-2024-43521 [HIGH] CWE-253 Windows Hyper-V Denial of Service Vulnerability
Windows Hyper-V Denial of Service Vulnerability
Role: Windows Hyper-V: Role: Windows Hyper-V
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Denial of Service
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely
Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5044277
Reference: https://support.microsoft.com/help/5044277
Reference:
msrc
CVE-2024-43560HIGHCVSS 7.82024-10-08
CVE-2024-43560 [HIGH] CWE-122 Microsoft Windows Storage Port Driver Elevation of Privilege Vulnerability
Microsoft Windows Storage Port Driver Elevation of Privilege Vulnerability
FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability?
An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.
Windows Storage Port Driver: Windows Storage Port Driver
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Elevation of
msrc
CVE-2024-43562HIGHCVSS 7.52024-10-08
CVE-2024-43562 [HIGH] CWE-125 Windows Network Address Translation (NAT) Denial of Service Vulnerability
Windows Network Address Translation (NAT) Denial of Service Vulnerability
Windows Network Address Translation (NAT): Windows Network Address Translation (NAT)
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Denial of Service
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely
Reference: https://catalog.update.microsoft.com/v7/sit
msrc
CVE-2024-43583HIGHCVSS 7.82024-10-08
CVE-2024-43583 [HIGH] CWE-250 Winlogon Elevation of Privilege Vulnerability
Winlogon Elevation of Privilege Vulnerability
FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability?
An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.
FAQ: Are there any further actions I need to take to be protected from this vulnerability?
Yes. To address this vulnerability, ensure that a Microsoft first-party Input Method Editor (IME)
msrc