Msrc Windows Server 2019 vulnerabilities
4,184 known vulnerabilities affecting msrc/windows_server_2019.
Total CVEs
4,184
CISA KEV
151
actively exploited
Public exploits
120
Exploited in wild
142
Severity breakdown
CRITICAL90HIGH2890MEDIUM1182LOW22
Vulnerabilities
Page 6 of 210
CVE-2026-20804HIGHCVSS 7.72026-01-13
CVE-2026-20804 [HIGH] CWE-266 Windows Hello Tampering Vulnerability
Windows Hello Tampering Vulnerability
Description: Incorrect privilege assignment in Windows Hello allows an unauthorized attacker to perform tampering locally.
Windows Hello: Windows Hello
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Tampering
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Unlikely
Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q
msrc
CVE-2026-20873HIGHCVSS 7.82026-01-13
CVE-2026-20873 [HIGH] CWE-362 Windows Management Services Elevation of Privilege Vulnerability
Windows Management Services Elevation of Privilege Vulnerability
Description: Concurrent execution using shared resource with improper synchronization ('race condition') in Windows Management Services allows an authorized attacker to elevate privileges locally.
FAQ: What privileges could be gained by an attacker who successfully exploited the vulnerability?
An attacker could use this vulnerability to
msrc
CVE-2026-20857HIGHCVSS 7.82026-01-13
CVE-2026-20857 [HIGH] CWE-822 Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability
Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability
Description: Untrusted pointer dereference in Windows Cloud Files Mini Filter Driver allows an authorized attacker to elevate privileges locally.
FAQ: What privileges could be gained by an attacker who successfully exploited the vulnerability?
An attacker who successfully exploited this vulnerability could gain spe
msrc
CVE-2026-20861HIGHCVSS 7.82026-01-13
CVE-2026-20861 [HIGH] CWE-362 Windows Management Services Elevation of Privilege Vulnerability
Windows Management Services Elevation of Privilege Vulnerability
Description: Concurrent execution using shared resource with improper synchronization ('race condition') in Windows Management Services allows an authorized attacker to elevate privileges locally.
FAQ: What privileges could be gained by an attacker who successfully exploited the vulnerability?
An attacker could use this vulnerability to
msrc
CVE-2026-20864HIGHCVSS 7.82026-01-13
CVE-2026-20864 [HIGH] CWE-122 Windows Connected Devices Platform Service Elevation of Privilege Vulnerability
Windows Connected Devices Platform Service Elevation of Privilege Vulnerability
Description: Heap-based buffer overflow in Connected Devices Platform Service (Cdpsvc) allows an authorized attacker to elevate privileges locally.
FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability?
An attacker who successfully exploited this vulnerability cou
msrc
CVE-2026-20923HIGHCVSS 7.82026-01-13
CVE-2026-20923 [HIGH] CWE-416 Windows Management Services Elevation of Privilege Vulnerability
Windows Management Services Elevation of Privilege Vulnerability
Description: Use after free in Windows Management Services allows an authorized attacker to elevate privileges locally.
FAQ: According to the CVSS metric, successful exploitation could lead to a scope change (S:C). What does this mean for this vulnerability?
In this case, a successful attack could be performed from a low privilege AppCo
msrc
CVE-2026-20826HIGHCVSS 7.82026-01-13
CVE-2026-20826 [HIGH] CWE-362 Tablet Windows User Interface (TWINUI) Subsystem Information Disclosure Vulnerability
Tablet Windows User Interface (TWINUI) Subsystem Information Disclosure Vulnerability
Description: Concurrent execution using shared resource with improper synchronization ('race condition') in Tablet Windows User Interface (TWINUI) Subsystem allows an authorized attacker to elevate privileges locally.
FAQ: What privileges could be gained by an attacker who successfully exploited
msrc
CVE-2026-20924HIGHCVSS 7.82026-01-13
CVE-2026-20924 [HIGH] CWE-416 Windows Management Services Elevation of Privilege Vulnerability
Windows Management Services Elevation of Privilege Vulnerability
Description: Use after free in Windows Management Services allows an authorized attacker to elevate privileges locally.
FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?
Successful exploitation of this vulnerability requires an attacker to win a race condition.
FAQ: Acc
msrc
CVE-2026-20868HIGHCVSS 8.82026-01-13
CVE-2026-20868 [HIGH] CWE-122 Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
Description: Heap-based buffer overflow in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to execute code over a network.
FAQ: How could an attacker exploit this vulnerability?
An attacker authenticated on the domain could exploit this vulnerability by tricking a
msrc
CVE-2026-20847MEDIUMCVSS 6.52026-01-13
CVE-2026-20847 [MEDIUM] CWE-200 Microsoft Windows File Explorer Spoofing Vulnerability
Microsoft Windows File Explorer Spoofing Vulnerability
Description: Exposure of sensitive information to an unauthorized actor in Windows Shell allows an authorized attacker to perform spoofing over a network.
Windows Shell: Windows Shell
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Spoofing
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Unlikely
Re
msrc
CVE-2026-20828MEDIUMCVSS 4.62026-01-13
CVE-2026-20828 [MEDIUM] CWE-125 Windows rndismp6.sys Information Disclosure Vulnerability
Windows rndismp6.sys Information Disclosure Vulnerability
Description: Out-of-bounds read in Windows Internet Connection Sharing (ICS) allows an unauthorized attacker to disclose information with a physical attack.
FAQ: What type of information could be disclosed by this vulnerability?
The type of information that could be disclosed if an attacker successfully exploited this vulnerability is Kernel memory
msrc
CVE-2026-20937MEDIUMCVSS 5.52026-01-13
CVE-2026-20937 [MEDIUM] CWE-200 Windows File Explorer Information Disclosure Vulnerability
Windows File Explorer Information Disclosure Vulnerability
Description: Exposure of sensitive information to an unauthorized actor in Windows File Explorer allows an authorized attacker to disclose information locally.
FAQ: What type of information could be disclosed by this vulnerability?
The type of information that could be disclosed if an attacker successfully exploited this vulnerability is an addre
msrc
CVE-2026-20925MEDIUMCVSS 6.52026-01-13
CVE-2026-20925 [MEDIUM] CWE-73 NTLM Hash Disclosure Spoofing Vulnerability
NTLM Hash Disclosure Spoofing Vulnerability
Description: External control of file name or path in Windows NTLM allows an unauthorized attacker to perform spoofing over a network.
FAQ: According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?
Minimal interaction with a malicious file by a user such as selecting (single-click), inspecting (right-click), or performing an
msrc
CVE-2026-20839MEDIUMCVSS 5.52026-01-13
CVE-2026-20839 [MEDIUM] CWE-284 Windows Client-Side Caching (CSC) Service Information Disclosure Vulnerability
Windows Client-Side Caching (CSC) Service Information Disclosure Vulnerability
Description: Improper access control in Windows Client-Side Caching (CSC) Service allows an authorized attacker to disclose information locally.
FAQ: What type of information could be disclosed by this vulnerability?
An attacker who successfully exploited this vulnerability could potentially read portions o
msrc
CVE-2026-20825MEDIUMCVSS 4.42026-01-13
CVE-2026-20825 [MEDIUM] CWE-284 Windows Hyper-V Information Disclosure Vulnerability
Windows Hyper-V Information Disclosure Vulnerability
Description: Improper access control in Windows Hyper-V allows an authorized attacker to disclose information locally.
FAQ: What type of information could be disclosed by this vulnerability?
The type of information that could be disclosed if an attacker successfully exploited this vulnerability is Guest VM to Hyper-V host server - virtualization security bou
msrc
CVE-2026-20872MEDIUMCVSS 6.52026-01-13
CVE-2026-20872 [MEDIUM] CWE-73 NTLM Hash Disclosure Spoofing Vulnerability
NTLM Hash Disclosure Spoofing Vulnerability
Description: External control of file name or path in Windows NTLM allows an unauthorized attacker to perform spoofing over a network.
FAQ: According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?
Minimal interaction with a malicious file by a user such as selecting (single-click), inspecting (right-click), or performing an
msrc
CVE-2026-20812MEDIUMCVSS 6.52026-01-13
CVE-2026-20812 [MEDIUM] CWE-20 LDAP Tampering Vulnerability
LDAP Tampering Vulnerability
Description: Improper input validation in Windows LDAP - Lightweight Directory Access Protocol allows an authorized attacker to perform tampering over a network.
Windows LDAP - Lightweight Directory Access Protocol: Windows LDAP - Lightweight Directory Access Protocol
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Tampering
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software
msrc
CVE-2026-20805MEDIUMCVSS 5.5KEV2026-01-13
CVE-2026-20805 [MEDIUM] CWE-200 Desktop Window Manager Information Disclosure Vulnerability
Desktop Window Manager Information Disclosure Vulnerability
Description: Exposure of sensitive information to an unauthorized actor in Desktop Windows Manager allows an authorized attacker to disclose information locally.
FAQ: What type of information could be disclosed by this vulnerability?
The type of information that could be disclosed if an attacker successfully exploited this vulnerability is a se
msrc
CVE-2026-20927MEDIUMCVSS 5.32026-01-13
CVE-2026-20927 [MEDIUM] CWE-362 Windows SMB Server Denial of Service Vulnerability
Windows SMB Server Denial of Service Vulnerability
Description: Concurrent execution using shared resource with improper synchronization ('race condition') in Windows SMB Server allows an authorized attacker to deny service over a network.
FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?
Successful exploitation of this vulnerability requires an
msrc
CVE-2026-20962MEDIUMCVSS 4.42026-01-13
CVE-2026-20962 [MEDIUM] CWE-908 Dynamic Root of Trust for Measurement (DRTM) Information Disclosure Vulnerability
Dynamic Root of Trust for Measurement (DRTM) Information Disclosure Vulnerability
Description: Use of uninitialized resource in Dynamic Root of Trust for Measurement (DRTM) allows an authorized attacker to disclose information locally.
FAQ: What type of information could be disclosed by this vulnerability?
The type of information that could be disclosed if an attacker successfully
msrc