Msrc Windows Server 2016 vulnerabilities
4,120 known vulnerabilities affecting msrc/windows_server_2016.
Total CVEs
4,120
CISA KEV
154
actively exploited
Public exploits
204
Exploited in wild
143
Severity breakdown
CRITICAL86HIGH2734MEDIUM1267LOW33
Vulnerabilities
Page 97 of 206
CVE-2022-30226HIGHCVSS 7.12022-07-12
CVE-2022-30226 [HIGH] Windows Print Spooler Elevation of Privilege Vulnerability
Windows Print Spooler Elevation of Privilege Vulnerability
FAQ: What privileges could be gained by an attacker who successfully exploited the vulnerability?
An attacker would only be able to delete targeted files on a system. They would not gain privileges to view or modify file contents.
Windows Print Spooler Components: Windows Print Spooler Components
Microsoft: Microsoft
Customer Action Required: Yes
Impact
msrc
CVE-2022-22036HIGHCVSS 7.02022-07-12
CVE-2022-22036 [HIGH] Performance Counters for Windows Elevation of Privilege Vulnerability
Performance Counters for Windows Elevation of Privilege Vulnerability
FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?
Successful exploitation of this vulnerability requires an attacker to win a race condition.
Windows Performance Counters: Windows Performance Counters
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Elevat
msrc
CVE-2022-30203HIGHCVSS 7.42022-07-12
CVE-2022-30203 [HIGH] Windows Boot Manager Security Feature Bypass Vulnerability
Windows Boot Manager Security Feature Bypass Vulnerability
FAQ: What kind of security feature could be bypassed by successfully exploiting this vulnerability?
An attacker who successfully exploited this vulnerability could bypass Secure Boot.
FAQ: According to the CVSS metric, a successful exploitation could lead to a scope change (S:C). What does this mean for this vulnerability?
Successful exploitation of this v
msrc
CVE-2022-30222HIGHCVSS 8.42022-07-12
CVE-2022-30222 [HIGH] Windows Shell Remote Code Execution Vulnerability
Windows Shell Remote Code Execution Vulnerability
FAQ: How could an attacker exploit this vulnerability?
An unauthenticated attacker could interact with the login screen of a vulnerable system in a specific manner to execute code on that system.
Windows Shell: Windows Shell
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Remote Code Execution
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software
msrc
CVE-2022-22043HIGHCVSS 7.82022-07-12
CVE-2022-22043 [HIGH] Windows Fast FAT File System Driver Elevation of Privilege Vulnerability
Windows Fast FAT File System Driver Elevation of Privilege Vulnerability
FAQ: Why are there two different impacts in the Security Updates table?
An attacker could potentially exploit this vulnerability to elevate privileges from a client-side application sandbox in earlier Microsoft operating systems. However, mitigation technologies in later Microsoft operating systems make this more difficult. For t
msrc
CVE-2022-22034HIGHCVSS 7.82022-07-12
CVE-2022-22034 [HIGH] Windows Graphics Component Elevation of Privilege Vulnerability
Windows Graphics Component Elevation of Privilege Vulnerability
FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability?
An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.
Microsoft Graphics Component: Microsoft Graphics Component
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Elevation of Privilege
Exploit Status:
msrc
CVE-2022-30209HIGHCVSS 7.42022-07-12
CVE-2022-30209 [HIGH] Windows IIS Server Elevation of Privilege Vulnerability
Windows IIS Server Elevation of Privilege Vulnerability
FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?
Successful exploitation of this vulnerability requires an attacker to take additional actions prior to exploitation to prepare the target environment.
FAQ: What privileges could be gained by an attacker who successfully exploited the vulnerability
msrc
CVE-2022-23825HIGHCVSS 6.52022-07-12
CVE-2022-23825 [MEDIUM] AMD: CVE-2022-23825 AMD CPU Branch Type Confusion
AMD: CVE-2022-23825 AMD CPU Branch Type Confusion
FAQ: Why is this AMD CVE included in the Security Update Guide?
The vulnerability assigned to this CVE is in certain processor models offered by AMD. The mitigation for this vulnerability requires a Windows update. This CVE is being documented in the Security Update Guide to announce that the latest builds of Windows enable the mitigation and provide protection against the
msrc
CVE-2022-22045HIGHCVSS 7.82022-07-12
CVE-2022-22045 [HIGH] Windows.Devices.Picker.dll Elevation of Privilege Vulnerability
Windows.Devices.Picker.dll Elevation of Privilege Vulnerability
FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?
Successful exploitation of this vulnerability requires an attacker to win a race condition.
FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability?
An attacker who successfully exploited t
msrc
CVE-2022-22025HIGHCVSS 7.52022-07-12
CVE-2022-22025 [HIGH] Windows Internet Information Services Cachuri Module Denial of Service Vulnerability
Windows Internet Information Services Cachuri Module Denial of Service Vulnerability
Windows IIS: Windows IIS
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Denial of Service
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A
Reference: https://catalog.update.microsoft.
msrc
CVE-2022-30220HIGHCVSS 7.82022-07-12
CVE-2022-30220 [HIGH] Windows Common Log File System Driver Elevation of Privilege Vulnerability
Windows Common Log File System Driver Elevation of Privilege Vulnerability
FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability?
An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.
Windows Storage: Windows Storage
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Elevation of Privilege
Exploit Status: Publ
msrc
CVE-2022-30215HIGHCVSS 7.52022-07-12
CVE-2022-30215 [HIGH] Active Directory Federation Services Elevation of Privilege Vulnerability
Active Directory Federation Services Elevation of Privilege Vulnerability
FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?
Successful exploitation of this vulnerability requires an attacker to take additional actions prior to exploitation to prepare the target environment.
FAQ: What privileges could be gained by an attacker who succ
msrc
CVE-2022-22037HIGHCVSS 7.52022-07-12
CVE-2022-22037 [HIGH] Windows Advanced Local Procedure Call (ALPC) Elevation of Privilege Vulnerability
Windows Advanced Local Procedure Call (ALPC) Elevation of Privilege Vulnerability
FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?
Successful exploitation of this vulnerability requires an attacker to win a race condition.
FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability?
An a
msrc
CVE-2022-22040HIGHCVSS 7.32022-07-12
CVE-2022-22040 [HIGH] Internet Information Services Dynamic Compression Module Denial of Service Vulnerability
Internet Information Services Dynamic Compression Module Denial of Service Vulnerability
FAQ: According to the CVSS metrics, successful exploitation of this vulnerability could lead to minor loss of confidentiality (C:L), integrity (I:L) and availability (A:L). What does that mean for this vulnerability?
While we cannot rule out the impact to Confidentiality, Integrity, and Availabilit
msrc
CVE-2022-29900HIGHCVSS 6.52022-07-12
CVE-2022-29900 [MEDIUM] AMD: CVE-2022-29900 AMD CPU Branch Type Confusion
AMD: CVE-2022-29900 AMD CPU Branch Type Confusion
FAQ: Why is this AMD CVE included in the Security Update Guide?
The vulnerability assigned to this CVE is in certain processor models offered by AMD. The mitigation for this vulnerability requires a Windows update. This CVE is being documented in the Security Update Guide to announce that the latest builds of Windows enable the mitigation and provide protection against the
msrc
CVE-2022-30206HIGHCVSS 7.82022-07-12
CVE-2022-30206 [HIGH] Windows Print Spooler Elevation of Privilege Vulnerability
Windows Print Spooler Elevation of Privilege Vulnerability
FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability?
An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.
Windows Print Spooler Components: Windows Print Spooler Components
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Elevation of Privilege
Exploit Status: Pu
msrc
CVE-2022-22041MEDIUMCVSS 6.82022-07-12
CVE-2022-22041 [MEDIUM] Windows Print Spooler Elevation of Privilege Vulnerability
Windows Print Spooler Elevation of Privilege Vulnerability
FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability?
An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.
FAQ: According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?
The user would have to click on a specially crafted U
msrc
CVE-2022-22711MEDIUMCVSS 5.72022-07-12
CVE-2022-22711 [MEDIUM] Windows BitLocker Information Disclosure Vulnerability
Windows BitLocker Information Disclosure Vulnerability
FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?
Successful exploitation of this vulnerability requires an attacker to invest time in repeated exploitation attempts through sending constant or intermittent data.
FAQ: What type of information could be disclosed by this vulnerability?
The type of
msrc
CVE-2022-30208MEDIUMCVSS 6.52022-07-12
CVE-2022-30208 [MEDIUM] Windows Security Account Manager (SAM) Denial of Service Vulnerability
Windows Security Account Manager (SAM) Denial of Service Vulnerability
Windows Security Account Manager: Windows Security Account Manager
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Denial of Service
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A
Reference: https://catalog.u
msrc
CVE-2022-30214MEDIUMCVSS 6.62022-07-12
CVE-2022-30214 [MEDIUM] Windows DNS Server Remote Code Execution Vulnerability
Windows DNS Server Remote Code Execution Vulnerability
FAQ: According to the CVSS metric, privileges required is high (PR:H). What does that mean for this vulnerability?
Successful exploitation of this vulnerability requires the attacker or targeted user to have specific elevated privileges. As is best practice, regular validation and audits of administrative groups should be conducted.
FAQ: According to the CVSS me
msrc