Msrc Windows Server 2016 vulnerabilities
4,120 known vulnerabilities affecting msrc/windows_server_2016.
Total CVEs
4,120
CISA KEV
154
actively exploited
Public exploits
204
Exploited in wild
143
Severity breakdown
CRITICAL86HIGH2734MEDIUM1267LOW33
Vulnerabilities
Page 9 of 206
CVE-2025-55687HIGHCVSS 7.42025-10-14
CVE-2025-55687 [HIGH] CWE-362 Windows Resilient File System (ReFS) Elevation of Privilege Vulnerability
Windows Resilient File System (ReFS) Elevation of Privilege Vulnerability
Description: Concurrent execution using shared resource with improper synchronization ('race condition') in Windows Resilient File System (ReFS) allows an unauthorized attacker to elevate privileges locally.
FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerabil
msrc
CVE-2025-58730HIGHCVSS 7.02025-10-14
CVE-2025-58730 [HIGH] CWE-416 Inbox COM Objects (Global Memory) Remote Code Execution Vulnerability
Inbox COM Objects (Global Memory) Remote Code Execution Vulnerability
Description: Use after free in Inbox COM Objects allows an unauthorized attacker to execute code locally.
FAQ: According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?
An attacker must send a user a malicious Office file and convince them to open it.
FAQ: According to the
msrc
CVE-2025-55692HIGHCVSS 7.82025-10-14
CVE-2025-55692 [HIGH] CWE-20 Windows Error Reporting Service Elevation of Privilege Vulnerability
Windows Error Reporting Service Elevation of Privilege Vulnerability
Description: Improper input validation in Windows Error Reporting allows an authorized attacker to elevate privileges locally.
FAQ: What privileges could be gained by an attacker who successfully exploited the vulnerability?
An attacker who successfully exploited this vulnerability could gain administrator privileges.
Windows Er
msrc
CVE-2025-24990HIGHCVSS 7.8KEV2025-10-14
CVE-2025-24990 [HIGH] CWE-822 Windows Agere Modem Driver Elevation of Privilege Vulnerability
Windows Agere Modem Driver Elevation of Privilege Vulnerability
Description: Microsoft is aware of vulnerabilities in the third party Agere Modem driver that ships natively with supported Windows operating systems. This is an announcement of the upcoming removal of ltmdm64.sys driver. The driver has been removed in the October cumulative update.
Fax modem hardware dependent on this specific driver will
msrc
CVE-2025-58722HIGHCVSS 7.82025-10-14
CVE-2025-58722 [HIGH] CWE-122 Microsoft DWM Core Library Elevation of Privilege Vulnerability
Microsoft DWM Core Library Elevation of Privilege Vulnerability
Description: Heap-based buffer overflow in Windows DWM allows an authorized attacker to elevate privileges locally.
FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability?
An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.
Windows DWM: Windows DWM
Microsoft:
msrc
CVE-2025-58732HIGHCVSS 7.02025-10-14
CVE-2025-58732 [HIGH] CWE-416 Inbox COM Objects (Global Memory) Remote Code Execution Vulnerability
Inbox COM Objects (Global Memory) Remote Code Execution Vulnerability
Description: Use after free in Inbox COM Objects allows an unauthorized attacker to execute code locally.
FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?
Successful exploitation of this vulnerability requires an attacker to win a race condition.
FAQ: Accordi
msrc
CVE-2025-50152HIGHCVSS 7.82025-10-14
CVE-2025-50152 [HIGH] CWE-125 Windows Kernel Elevation of Privilege Vulnerability
Windows Kernel Elevation of Privilege Vulnerability
Description: Out-of-bounds read in Windows Kernel allows an authorized attacker to elevate privileges locally.
FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability?
An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.
Windows Kernel: Windows Kernel
Microsoft: Microsoft
Customer Ac
msrc
CVE-2025-59277HIGHCVSS 7.82025-10-14
CVE-2025-59277 [HIGH] CWE-1287 Windows Authentication Elevation of Privilege Vulnerability
Windows Authentication Elevation of Privilege Vulnerability
Description: Improper validation of specified type of input in Windows Authentication Methods allows an authorized attacker to elevate privileges locally.
FAQ: How could an attacker exploit this vulnerability?
To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted appli
msrc
CVE-2025-58733HIGHCVSS 7.02025-10-14
CVE-2025-58733 [HIGH] CWE-416 Inbox COM Objects (Global Memory) Remote Code Execution Vulnerability
Inbox COM Objects (Global Memory) Remote Code Execution Vulnerability
Description: Use after free in Inbox COM Objects allows an unauthorized attacker to execute code locally.
FAQ: According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?
An attacker must send a user a malicious Office file and convince them to open it.
FAQ: According to the
msrc
CVE-2025-59254HIGHCVSS 7.8PoC2025-10-14
CVE-2025-59254 [HIGH] CWE-122 Microsoft DWM Core Library Elevation of Privilege Vulnerability
Microsoft DWM Core Library Elevation of Privilege Vulnerability
Description: Heap-based buffer overflow in Windows DWM Core Library allows an authorized attacker to elevate privileges locally.
FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability?
An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.
Windows DWM Core Librar
msrc
CVE-2025-59202HIGHCVSS 7.02025-10-14
CVE-2025-59202 [HIGH] CWE-416 Windows Remote Desktop Services Elevation of Privilege Vulnerability
Windows Remote Desktop Services Elevation of Privilege Vulnerability
Description: Use after free in Windows Remote Desktop Services allows an authorized attacker to elevate privileges locally.
FAQ: What privileges could be gained by an attacker who successfully exploited the vulnerability?
An attacker who successfully exploited this vulnerability could gain administrator privileges.
FAQ: Accordi
msrc
CVE-2025-54957HIGHCVSS 7.02025-10-14
CVE-2025-54957 [CRITICAL] CWE-502 MITRE CVE-2025-54957: Integer overflow in Dolby Digital Plus audio decoder
MITRE CVE-2025-54957: Integer overflow in Dolby Digital Plus audio decoder
Description: Deserialization of untrusted data in Microsoft Windows Codecs Library allows an unauthorized attacker to execute code locally.
FAQ: According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?
An attacker must send a user a malicious Office file and c
msrc
CVE-2025-58737HIGHCVSS 7.02025-10-14
CVE-2025-58737 [HIGH] CWE-416 Remote Desktop Protocol Remote Code Execution Vulnerability
Remote Desktop Protocol Remote Code Execution Vulnerability
Description: Use after free in Windows Remote Desktop allows an unauthorized attacker to execute code locally.
FAQ: According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?
An attacker must send a user a malicious Office file and convince them to open it.
FAQ: According to the CVSS metric, th
msrc
CVE-2025-59275HIGHCVSS 7.82025-10-14
CVE-2025-59275 [HIGH] CWE-1287 Windows Authentication Elevation of Privilege Vulnerability
Windows Authentication Elevation of Privilege Vulnerability
Description: Improper validation of specified type of input in Windows Authentication Methods allows an authorized attacker to elevate privileges locally.
FAQ: What privileges could be gained by an attacker who successfully exploited the vulnerability?
An attacker who successfully exploited this vulnerability could gain administrator privileges.
msrc
CVE-2025-55678HIGHCVSS 7.02025-10-14
CVE-2025-55678 [HIGH] CWE-416 DirectX Graphics Kernel Elevation of Privilege Vulnerability
DirectX Graphics Kernel Elevation of Privilege Vulnerability
Description: Use after free in Windows DirectX allows an authorized attacker to elevate privileges locally.
FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability?
An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.
FAQ: According to the CVSS metric, the attack comp
msrc
CVE-2025-59208HIGHCVSS 7.12025-10-14
CVE-2025-59208 [HIGH] CWE-125 Windows MapUrlToZone Information Disclosure Vulnerability
Windows MapUrlToZone Information Disclosure Vulnerability
Description: Out-of-bounds read in Windows MapUrlToZone allows an unauthorized attacker to disclose information over a network.
FAQ: According to the CVSS metrics, successful exploitation of this vulnerability could lead to major loss of confidentiality (C:H), and some loss of integrity (I:L), but no loss of availability (A:N). What does that mean fo
msrc
CVE-2025-58715HIGHCVSS 8.82025-10-14
CVE-2025-58715 [HIGH] CWE-190 Windows Speech Runtime Elevation of Privilege Vulnerability
Windows Speech Runtime Elevation of Privilege Vulnerability
Description: Integer overflow or wraparound in Microsoft Windows Speech allows an authorized attacker to elevate privileges locally.
FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability?
An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.
FAQ: According to the CVSS
msrc
CVE-2025-58735HIGHCVSS 7.02025-10-14
CVE-2025-58735 [HIGH] CWE-416 Inbox COM Objects (Global Memory) Remote Code Execution Vulnerability
Inbox COM Objects (Global Memory) Remote Code Execution Vulnerability
Description: Use after free in Inbox COM Objects allows an unauthorized attacker to execute code locally.
FAQ: According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?
An attacker must send a user a malicious Office file and convince them to open it.
FAQ: According to the
msrc
CVE-2025-59230HIGHCVSS 7.8KEV2025-10-14
CVE-2025-59230 [HIGH] CWE-284 Windows Remote Access Connection Manager Elevation of Privilege Vulnerability
Windows Remote Access Connection Manager Elevation of Privilege Vulnerability
Description: Improper access control in Windows Remote Access Connection Manager allows an authorized attacker to elevate privileges locally.
FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability?
An attacker who successfully exploited this vulnerability could gain SY
msrc
CVE-2025-59200HIGHCVSS 7.72025-10-14
CVE-2025-59200 [HIGH] CWE-362 Data Sharing Service Spoofing Vulnerability
Data Sharing Service Spoofing Vulnerability
Description: Concurrent execution using shared resource with improper synchronization ('race condition') in Data Sharing Service Client allows an unauthorized attacker to perform spoofing locally.
FAQ: According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?
The user would have to click a specially crafted button for the att
msrc