Msrc Windows Server 2019 vulnerabilities

4,184 known vulnerabilities affecting msrc/windows_server_2019.

Total CVEs
4,184
CISA KEV
151
actively exploited
Public exploits
120
Exploited in wild
142
Severity breakdown
CRITICAL90HIGH2890MEDIUM1182LOW22

Vulnerabilities

Page 4 of 210
CVE-2026-21525MEDIUMCVSS 6.2KEV2026-02-10
CVE-2026-21525 [MEDIUM] CWE-476 Windows Remote Access Connection Manager Denial of Service Vulnerability Windows Remote Access Connection Manager Denial of Service Vulnerability Description: Null pointer dereference in Windows Remote Access Connection Manager allows an unauthorized attacker to deny service locally. Windows Remote Access Connection Manager: Windows Remote Access Connection Manager Microsoft: Microsoft Customer Action Required: Yes Impact: Denial of Service Exploit Status: P
msrc
CVE-2026-21249LOWCVSS 3.32026-02-10
CVE-2026-21249 [LOW] CWE-73 Windows NTLM Spoofing Vulnerability Windows NTLM Spoofing Vulnerability Description: External control of file name or path in Windows NTLM allows an unauthorized attacker to perform spoofing locally. FAQ: According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do? An attacker must send a user a malicious Office file and convince them to open it. FAQ: According to the CVSS metrics, successful exploitation of this vu
msrc
CVE-2026-20929HIGHCVSS 7.52026-01-13
CVE-2026-20929 [HIGH] CWE-284 Windows HTTP.sys Elevation of Privilege Vulnerability Windows HTTP.sys Elevation of Privilege Vulnerability Description: Improper access control in Windows HTTP.sys allows an authorized attacker to elevate privileges over a network. FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability? The Attack requires an Service Principal Name (SPN) that is registered to an account that no longer exists or is not i
msrc
CVE-2026-20931HIGHCVSS 8.02026-01-13
CVE-2026-20931 [HIGH] CWE-73 Windows Telephony Service Elevation of Privilege Vulnerability Windows Telephony Service Elevation of Privilege Vulnerability Description: External control of file name or path in Windows Telephony Service allows an authorized attacker to elevate privileges over an adjacent network. FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges
msrc
CVE-2026-20921HIGHCVSS 7.52026-01-13
CVE-2026-20921 [HIGH] CWE-362 Windows SMB Server Elevation of Privilege Vulnerability Windows SMB Server Elevation of Privilege Vulnerability Description: Concurrent execution using shared resource with improper synchronization ('race condition') in Windows SMB Server allows an authorized attacker to elevate privileges over a network. FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability? Successful exploitation of this vulnerabilit
msrc
CVE-2026-20869HIGHCVSS 7.02026-01-13
CVE-2026-20869 [HIGH] CWE-362 Windows Local Session Manager (LSM) Elevation of Privilege Vulnerability Windows Local Session Manager (LSM) Elevation of Privilege Vulnerability Description: Concurrent execution using shared resource with improper synchronization ('race condition') in Windows Local Session Manager (LSM) allows an authorized attacker to elevate privileges locally. FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?
msrc
CVE-2026-20832HIGHCVSS 7.82026-01-13
CVE-2026-20832 [HIGH] CWE-415 Windows Remote Procedure Call Interface Definition Language (IDL) Elevation of Privilege Vulnerability Windows Remote Procedure Call Interface Definition Language (IDL) Elevation of Privilege Vulnerability FAQ: What privileges could be gained by an attacker who successfully exploited the vulnerability? An attacker who successfully exploited this vulnerability could create, modify, or delete files in the security context of the "NT AUTHORITY\SYSTEM" account. Window
msrc
CVE-2026-20922HIGHCVSS 7.82026-01-13
CVE-2026-20922 [HIGH] CWE-122 Windows NTFS Remote Code Execution Vulnerability Windows NTFS Remote Code Execution Vulnerability Description: Heap-based buffer overflow in Windows NTFS allows an authorized attacker to execute code locally. FAQ: According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution? The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as A
msrc
CVE-2026-20848HIGHCVSS 7.52026-01-13
CVE-2026-20848 [HIGH] CWE-362 Windows SMB Server Elevation of Privilege Vulnerability Windows SMB Server Elevation of Privilege Vulnerability Description: Concurrent execution using shared resource with improper synchronization ('race condition') in Windows SMB Server allows an authorized attacker to elevate privileges over a network. FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability coul
msrc
CVE-2026-20919HIGHCVSS 7.52026-01-13
CVE-2026-20919 [HIGH] CWE-362 Windows SMB Server Elevation of Privilege Vulnerability Windows SMB Server Elevation of Privilege Vulnerability Description: Concurrent execution using shared resource with improper synchronization ('race condition') in Windows SMB Server allows an authorized attacker to elevate privileges over a network. FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability? Successful exploitation of this vulnerabilit
msrc
CVE-2026-20865HIGHCVSS 7.82026-01-13
CVE-2026-20865 [HIGH] CWE-416 Windows Management Services Elevation of Privilege Vulnerability Windows Management Services Elevation of Privilege Vulnerability Description: Use after free in Windows Management Services allows an authorized attacker to elevate privileges locally. FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability? Successful exploitation of this vulnerability requires an attacker to win a race condition. FAQ: Acc
msrc
CVE-2026-20810HIGHCVSS 7.82026-01-13
CVE-2026-20810 [HIGH] CWE-590 Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability Description: Free of memory not on the heap in Windows Ancillary Function Driver for WinSock allows an authorized attacker to elevate privileges locally. FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulne
msrc
CVE-2026-20809HIGHCVSS 7.82026-01-13
CVE-2026-20809 [HIGH] CWE-367 Windows Kernel Memory Elevation of Privilege Vulnerability Windows Kernel Memory Elevation of Privilege Vulnerability Description: Time-of-check time-of-use (toctou) race condition in Windows Kernel Memory allows an authorized attacker to elevate privileges locally. FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain Kernel Memory Access. Windows Ke
msrc
CVE-2026-20940HIGHCVSS 7.82026-01-13
CVE-2026-20940 [HIGH] CWE-822 Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability Description: Heap-based buffer overflow in Windows Cloud Files Mini Filter Driver allows an authorized attacker to elevate privileges locally. FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTE
msrc
CVE-2026-20840HIGHCVSS 7.82026-01-13
CVE-2026-20840 [HIGH] CWE-122 Windows NTFS Remote Code Execution Vulnerability Windows NTFS Remote Code Execution Vulnerability Description: Heap-based buffer overflow in Windows NTFS allows an authorized attacker to execute code locally. FAQ: According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution? The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as A
msrc
CVE-2026-20843HIGHCVSS 7.82026-01-13
CVE-2026-20843 [HIGH] CWE-284 Windows Routing and Remote Access Service (RRAS) Elevation of Privilege Vulnerability Windows Routing and Remote Access Service (RRAS) Elevation of Privilege Vulnerability Description: Improper access control in Windows Routing and Remote Access Service (RRAS) allows an authorized attacker to elevate privileges locally. FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vul
msrc
CVE-2026-20856HIGHCVSS 8.12026-01-13
CVE-2026-20856 [HIGH] CWE-20 Windows Server Update Service (WSUS) Remote Code Execution Vulnerability Windows Server Update Service (WSUS) Remote Code Execution Vulnerability Description: Improper input validation in Windows Server Update Service allows an unauthorized attacker to execute code over a network. FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability? The attacker must inject themselves into the logical network path betw
msrc
CVE-2026-20852HIGHCVSS 7.72026-01-13
CVE-2026-20852 [HIGH] CWE-266 Windows Hello Tampering Vulnerability Windows Hello Tampering Vulnerability Description: Incorrect privilege assignment in Windows Hello allows an unauthorized attacker to perform tampering locally. Windows Hello: Windows Hello Microsoft: Microsoft Customer Action Required: Yes Impact: Tampering Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely Reference: https://catalog.update.microsoft.com/v7/site/Search.asp
msrc
CVE-2026-20836HIGHCVSS 7.02026-01-13
CVE-2026-20836 [HIGH] CWE-362 DirectX Graphics Kernel Elevation of Privilege Vulnerability DirectX Graphics Kernel Elevation of Privilege Vulnerability Description: Concurrent execution using shared resource with improper synchronization ('race condition') in Graphics Kernel allows an authorized attacker to elevate privileges locally. FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability coul
msrc
CVE-2026-20866HIGHCVSS 7.82026-01-13
CVE-2026-20866 [HIGH] CWE-362 Windows Management Services Elevation of Privilege Vulnerability Windows Management Services Elevation of Privilege Vulnerability Description: Concurrent execution using shared resource with improper synchronization ('race condition') in Windows Management Services allows an authorized attacker to elevate privileges locally. FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability? Successful exploitation
msrc