Msrc Windows Server 2019 vulnerabilities
4,184 known vulnerabilities affecting msrc/windows_server_2019.
Total CVEs
4,184
CISA KEV
151
actively exploited
Public exploits
120
Exploited in wild
142
Severity breakdown
CRITICAL90HIGH2890MEDIUM1182LOW22
Vulnerabilities
Page 48 of 210
CVE-2024-38149HIGHCVSS 7.52024-10-08
CVE-2024-38149 [HIGH] CWE-400 BranchCache Denial of Service Vulnerability
BranchCache Denial of Service Vulnerability
BranchCache: BranchCache
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Denial of Service
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely
Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5044277
Reference: https://support.microsoft.com/help/5044277
Reference: https://catalog.update.micr
msrc
CVE-2024-43608HIGHCVSS 8.82024-10-08
CVE-2024-43608 [HIGH] CWE-122 Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
FAQ: According to the CVSS metric, the attack vector is network (AV:N) and the user interaction is required (UI:R). What is the target context of the remote code execution?
This attack requires an admin user on the client to connect to a malicious server, and that could allow the attacker to gain c
msrc
CVE-2024-43544HIGHCVSS 7.52024-10-08
CVE-2024-43544 [HIGH] CWE-400 Microsoft Simple Certificate Enrollment Protocol Denial of Service Vulnerability
Microsoft Simple Certificate Enrollment Protocol Denial of Service Vulnerability
Microsoft Simple Certificate Enrollment Protocol: Microsoft Simple Certificate Enrollment Protocol
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Denial of Service
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely
Reference: https://catalog
msrc
CVE-2024-20659HIGHCVSS 7.12024-10-08
CVE-2024-20659 [HIGH] CWE-20 Windows Hyper-V Security Feature Bypass Vulnerability
Windows Hyper-V Security Feature Bypass Vulnerability
FAQ: According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?
Successful exploitation of this vulnerability by an attacker requires a user to first reboot their machine.
FAQ: What kind of security feature could be bypassed by successfully exploiting this vulnerability?
This Hypervisor vulnerability relates
msrc
CVE-2024-43563HIGHCVSS 7.82024-10-08
CVE-2024-43563 [HIGH] CWE-591 Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability?
An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.
Windows Ancillary Function Driver for WinSock: Windows Ancillary Function Driver for WinSock
Microsoft: Microsoft
msrc
CVE-2024-43532HIGHCVSS 8.82024-10-08
CVE-2024-43532 [HIGH] CWE-636 Remote Registry Service Elevation of Privilege Vulnerability
Remote Registry Service Elevation of Privilege Vulnerability
FAQ: How could an attacker exploit the vulnerability?
To exploit this vulnerability, an attacker could execute a specially crafted malicious script which executes an RPC call to an RPC host. This could result in elevation of privilege on the server.
FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerabilit
msrc
CVE-2024-43592HIGHCVSS 8.82024-10-08
CVE-2024-43592 [HIGH] CWE-20 Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
FAQ: According to the CVSS metric, the attack vector is network (AV:N) and the user interaction is required (UI:R). What is the target context of the remote code execution?
This attack requires an admin user on the client to connect to a malicious server, and that could allow the attacker to gain co
msrc
CVE-2024-43545HIGHCVSS 7.52024-10-08
CVE-2024-43545 [HIGH] CWE-400 Windows Online Certificate Status Protocol (OCSP) Server Denial of Service Vulnerability
Windows Online Certificate Status Protocol (OCSP) Server Denial of Service Vulnerability
Windows Online Certificate Status Protocol (OCSP): Windows Online Certificate Status Protocol (OCSP)
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Denial of Service
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely
Referenc
msrc
CVE-2024-43556HIGHCVSS 7.82024-10-08
CVE-2024-43556 [HIGH] CWE-416 Windows Graphics Component Elevation of Privilege Vulnerability
Windows Graphics Component Elevation of Privilege Vulnerability
FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability?
An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.
Microsoft Graphics Component: Microsoft Graphics Component
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Elevation of Privilege
Exploit
msrc
CVE-2024-43575HIGHCVSS 7.52024-10-08
CVE-2024-43575 [HIGH] CWE-400 Windows Hyper-V Denial of Service Vulnerability
Windows Hyper-V Denial of Service Vulnerability
Role: Windows Hyper-V: Role: Windows Hyper-V
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Denial of Service
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely
Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5044277
Reference: https://support.microsoft.com/help/5044277
Reference:
msrc
CVE-2024-43549HIGHCVSS 8.82024-10-08
CVE-2024-43549 [HIGH] CWE-121 Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
FAQ: How could an attacker exploit this vulnerability?
An attacker could exploit this vulnerability by tricking a user into sending a request to a malicious server. This could result in the server returning malicious data that might cause arbitrary code execution on the user's system.
FAQ: Accordi
msrc
CVE-2024-43567HIGHCVSS 7.52024-10-08
CVE-2024-43567 [HIGH] CWE-770 Windows Hyper-V Denial of Service Vulnerability
Windows Hyper-V Denial of Service Vulnerability
Role: Windows Hyper-V: Role: Windows Hyper-V
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Denial of Service
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely
Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5044277
Reference: https://support.microsoft.com/help/5044277
Reference:
msrc
CVE-2024-43501HIGHCVSS 7.82024-10-08
CVE-2024-43501 [HIGH] CWE-59 Windows Common Log File System Driver Elevation of Privilege Vulnerability
Windows Common Log File System Driver Elevation of Privilege Vulnerability
FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability?
An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.
Windows Common Log File System Driver: Windows Common Log File System Driver
Microsoft: Microsoft
Customer Action Required: Yes
I
msrc
CVE-2024-6197HIGHCVSS 8.82024-10-08
CVE-2024-6197 [HIGH] CWE-590 Hackerone: CVE-2024-6197 Freeing stack buffer in utf8asn1str
Hackerone: CVE-2024-6197 Freeing stack buffer in utf8asn1str
NIST NVD Details: https://nvd.nist.gov/vuln/detail/CVE-2024-6197
FAQ: According to the CVSS metric, the attack vector is network (AV:N) and the user interaction is required (UI:R). What is the target context of the remote code execution?
This attack requires a client to connect to a malicious server, and that could allow the attacker to gain cod
msrc
CVE-2024-43582HIGHCVSS 8.12024-10-08
CVE-2024-43582 [HIGH] CWE-416 Remote Desktop Protocol Server Remote Code Execution Vulnerability
Remote Desktop Protocol Server Remote Code Execution Vulnerability
FAQ: How could an attacker exploit this vulnerability?
To exploit this vulnerability, an unauthenticated attacker would need to send malformed packets to a websocket listening port. This could result in remote code execution on the server side with the same permissions as the websocket service.
FAQ: According to the CVSS metric, the
msrc
CVE-2024-43589HIGHCVSS 8.82024-10-08
CVE-2024-43589 [HIGH] CWE-122 Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
Windows Routing and Remote Access Service (RRAS): Windows Routing and Remote Access Service (RRAS)
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Remote Code Execution
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely
Reference: htt
msrc
CVE-2024-43551HIGHCVSS 7.82024-10-08
CVE-2024-43551 [HIGH] CWE-59 Windows Storage Elevation of Privilege Vulnerability
Windows Storage Elevation of Privilege Vulnerability
FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability?
An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.
Windows Storage: Windows Storage
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Elevation of Privilege
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest
msrc
CVE-2024-43615HIGHCVSS 7.12024-10-08
CVE-2024-43615 [HIGH] CWE-73 Microsoft OpenSSH for Windows Remote Code Execution Vulnerability
Microsoft OpenSSH for Windows Remote Code Execution Vulnerability
FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?
Successful exploitation of this vulnerability requires an attacker to gather information specific to the environment of the targeted component.
FAQ: According to the CVSS metric, privileges required is low (PR:L). What d
msrc
CVE-2024-43519HIGHCVSS 8.82024-10-08
CVE-2024-43519 [HIGH] CWE-197 Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability
Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability
FAQ: According to the CVSS metric, the attack vector is network (AV:N) and the user interaction is required (UI:R). What is the target context of the remote code execution?
An authenticated victim who is connected to the network must be tricked or persuaded to connect to a malicious SQL database using th
msrc
CVE-2024-43593HIGHCVSS 8.82024-10-08
CVE-2024-43593 [HIGH] CWE-20 Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
FAQ: How could an attacker exploit this vulnerability?
An unauthenticated attacker could send a specially crafted protocol message to a Routing and Remote Access Service (RRAS) server, which could lead to remote code execution (RCE) on the RAS server machine.
Windows Routing and Remote Access Servi
msrc