Msrc Windows Server 2019 vulnerabilities
4,184 known vulnerabilities affecting msrc/windows_server_2019.
Total CVEs
4,184
CISA KEV
151
actively exploited
Public exploits
120
Exploited in wild
142
Severity breakdown
CRITICAL90HIGH2890MEDIUM1182LOW22
Vulnerabilities
Page 5 of 210
CVE-2026-20844HIGHCVSS 7.42026-01-13
CVE-2026-20844 [HIGH] CWE-416 Windows Clipboard Server Elevation of Privilege Vulnerability
Windows Clipboard Server Elevation of Privilege Vulnerability
Description: Use after free in Windows Clipboard Server allows an unauthorized attacker to elevate privileges locally.
FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability?
An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.
FAQ: According to the CVSS metric, th
msrc
CVE-2026-20820HIGHCVSS 7.82026-01-13
CVE-2026-20820 [HIGH] CWE-122 Windows Common Log File System Driver Elevation of Privilege Vulnerability
Windows Common Log File System Driver Elevation of Privilege Vulnerability
Description: Heap-based buffer overflow in Windows Common Log File System Driver allows an authorized attacker to elevate privileges locally.
FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability?
An attacker who successfully exploited this vulnerability could gain SYSTEM p
msrc
CVE-2026-20858HIGHCVSS 7.82026-01-13
CVE-2026-20858 [HIGH] CWE-416 Windows Management Services Elevation of Privilege Vulnerability
Windows Management Services Elevation of Privilege Vulnerability
Description: Use after free in Windows Management Services allows an authorized attacker to elevate privileges locally.
FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?
Successful exploitation of this vulnerability requires an attacker to win a race condition.
FAQ: Acc
msrc
CVE-2026-20934HIGHCVSS 7.52026-01-13
CVE-2026-20934 [HIGH] CWE-362 Windows SMB Server Elevation of Privilege Vulnerability
Windows SMB Server Elevation of Privilege Vulnerability
Description: Concurrent execution using shared resource with improper synchronization ('race condition') in Windows SMB Server allows an authorized attacker to elevate privileges over a network.
FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?
Successful exploitation of this vulnerabilit
msrc
CVE-2026-20831HIGHCVSS 7.82026-01-13
CVE-2026-20831 [HIGH] CWE-367 Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
Description: Time-of-check time-of-use (toctou) race condition in Windows Ancillary Function Driver for WinSock allows an authorized attacker to elevate privileges locally.
FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability?
An attacker who successfully e
msrc
CVE-2023-31096HIGHCVSS 7.82026-01-13
CVE-2023-31096 [HIGH] CWE-121 MITRE: CVE-2023-31096 Windows Agere Soft Modem Driver Elevation of Privilege Vulnerability
MITRE: CVE-2023-31096 Windows Agere Soft Modem Driver Elevation of Privilege Vulnerability
Description: Microsoft is aware of vulnerabilities in the third party Agere Soft Modem drivers that ship natively with supported Windows operating systems. This is an announcement of the removal of agrsm64.sys and agrsm.sys drivers. The drivers have been removed in the January 2026 cumu
msrc
CVE-2026-20860HIGHCVSS 7.82026-01-13
CVE-2026-20860 [HIGH] CWE-843 Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
Description: Access of resource using incompatible type ('type confusion') in Windows Ancillary Function Driver for WinSock allows an authorized attacker to elevate privileges locally.
FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability?
An attacker who su
msrc
CVE-2026-20874HIGHCVSS 7.82026-01-13
CVE-2026-20874 [HIGH] CWE-362 Windows Management Services Elevation of Privilege Vulnerability
Windows Management Services Elevation of Privilege Vulnerability
Description: Concurrent execution using shared resource with improper synchronization ('race condition') in Windows Management Services allows an authorized attacker to elevate privileges locally.
FAQ: According to the CVSS metric, successful exploitation could lead to a scope change (S:C). What does this mean for this vulnerability?
In
msrc
CVE-2026-20877HIGHCVSS 7.82026-01-13
CVE-2026-20877 [HIGH] CWE-416 Windows Management Services Elevation of Privilege Vulnerability
Windows Management Services Elevation of Privilege Vulnerability
Description: Use after free in Windows Management Services allows an authorized attacker to elevate privileges locally.
FAQ: According to the CVSS metric, successful exploitation could lead to a scope change (S:C). What does this mean for this vulnerability?
In this case, a successful attack could be performed from a low privilege AppCo
msrc
CVE-2026-20849HIGHCVSS 7.52026-01-13
CVE-2026-20849 [HIGH] CWE-807 Windows Kerberos Elevation of Privilege Vulnerability
Windows Kerberos Elevation of Privilege Vulnerability
Description: Reliance on untrusted inputs in a security decision in Windows Kerberos allows an authorized attacker to elevate privileges over a network.
FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?
A high attack complexity means the attacker must be able to perform a precise machine‑in‑t
msrc
CVE-2026-20822HIGHCVSS 7.82026-01-13
CVE-2026-20822 [HIGH] CWE-416 Windows Graphics Component Elevation of Privilege Vulnerability
Windows Graphics Component Elevation of Privilege Vulnerability
Description: Use after free in Microsoft Graphics Component allows an authorized attacker to elevate privileges locally.
FAQ: According to the CVSS metric, a successful exploitation could lead to a scope change (S:C). What does this mean for this vulnerability?
In a GPU paravirtualization scenario, an attacker who successfully exploited t
msrc
CVE-2026-0386HIGHCVSS 7.52026-01-13
CVE-2026-0386 [HIGH] CWE-284 Windows Deployment Services Remote Code Execution Vulnerability
Windows Deployment Services Remote Code Execution Vulnerability
Description: Improper access control in Windows Deployment Services allows an unauthorized attacker to execute code over an adjacent network.
FAQ: Are there additional steps I need to take to be protected from this vulnerability?
Admins should take the following steps to be protected from CVE-2026-0386:
Audit existing WDS usage and identi
msrc
CVE-2026-20926HIGHCVSS 7.52026-01-13
CVE-2026-20926 [HIGH] CWE-362 Windows SMB Server Elevation of Privilege Vulnerability
Windows SMB Server Elevation of Privilege Vulnerability
Description: Concurrent execution using shared resource with improper synchronization ('race condition') in Windows SMB Server allows an authorized attacker to elevate privileges over a network.
FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?
Successful exploitation of this vulnerabilit
msrc
CVE-2026-20867HIGHCVSS 7.82026-01-13
CVE-2026-20867 [HIGH] CWE-362 Windows Management Services Elevation of Privilege Vulnerability
Windows Management Services Elevation of Privilege Vulnerability
Description: Concurrent execution using shared resource with improper synchronization ('race condition') in Windows Management Services allows an authorized attacker to elevate privileges locally.
FAQ: According to the CVSS metric, successful exploitation could lead to a scope change (S:C). What does this mean for this vulnerability?
In
msrc
CVE-2026-20875HIGHCVSS 7.52026-01-13
CVE-2026-20875 [HIGH] CWE-476 Windows Local Security Authority Subsystem Service (LSASS) Denial of Service Vulnerability
Windows Local Security Authority Subsystem Service (LSASS) Denial of Service Vulnerability
Description: Null pointer dereference in Windows Local Security Authority Subsystem Service (LSASS) allows an unauthorized attacker to deny service over a network.
Windows Local Security Authority Subsystem Service (LSASS): Windows Local Security Authority Subsystem Service (LSASS)
Mi
msrc
CVE-2026-20816HIGHCVSS 7.82026-01-13
CVE-2026-20816 [HIGH] CWE-367 Windows Installer Elevation of Privilege Vulnerability
Windows Installer Elevation of Privilege Vulnerability
Description: Time-of-check time-of-use (toctou) race condition in Windows Installer allows an authorized attacker to elevate privileges locally.
FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability?
An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.
Windows Installer: Window
msrc
CVE-2024-55414HIGHCVSS 7.82026-01-13
CVE-2024-55414 [CRITICAL] CWE-122 Windows Motorola Soft Modem Driver Elevation of Privilege Vulnerability
Windows Motorola Soft Modem Driver Elevation of Privilege Vulnerability
Description: Microsoft is aware of vulnerabilities in the third party Motorola Soft Modem drivers that ships natively with supported Windows operating systems.
This is an announcement of the upcoming removal of smserl64.sys and smserial.sys drivers. The drivers have been removed in the January cumulative update.
Soft mo
msrc
CVE-2026-20918HIGHCVSS 7.82026-01-13
CVE-2026-20918 [HIGH] CWE-362 Windows Management Services Elevation of Privilege Vulnerability
Windows Management Services Elevation of Privilege Vulnerability
Description: Concurrent execution using shared resource with improper synchronization ('race condition') in Windows Management Services allows an authorized attacker to elevate privileges locally.
FAQ: According to the CVSS metric, successful exploitation could lead to a scope change (S:C). What does this mean for this vulnerability?
In
msrc
CVE-2026-20837HIGHCVSS 7.82026-01-13
CVE-2026-20837 [HIGH] CWE-122 Windows Media Remote Code Execution Vulnerability
Windows Media Remote Code Execution Vulnerability
Description: Heap-based buffer overflow in Windows Media allows an unauthorized attacker to execute code locally.
FAQ: According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution?
The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to
msrc
CVE-2026-20814HIGHCVSS 7.02026-01-13
CVE-2026-20814 [HIGH] CWE-362 DirectX Graphics Kernel Elevation of Privilege Vulnerability
DirectX Graphics Kernel Elevation of Privilege Vulnerability
Description: Concurrent execution using shared resource with improper synchronization ('race condition') in Graphics Kernel allows an authorized attacker to elevate privileges locally.
FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?
Successful exploitation of this vulnerabilit
msrc