Msrc Windows Server 2019 vulnerabilities
4,184 known vulnerabilities affecting msrc/windows_server_2019.
Total CVEs
4,184
CISA KEV
151
actively exploited
Public exploits
120
Exploited in wild
142
Severity breakdown
CRITICAL90HIGH2890MEDIUM1182LOW22
Vulnerabilities
Page 63 of 210
CVE-2024-26239HIGHCVSS 7.82024-04-09
CVE-2024-26239 [HIGH] CWE-122 Windows Telephony Server Elevation of Privilege Vulnerability
Windows Telephony Server Elevation of Privilege Vulnerability
FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability?
An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.
Windows Remote Access Connection Manager: Windows Remote Access Connection Manager
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Elevation of
msrc
CVE-2024-26202HIGHCVSS 7.22024-04-09
CVE-2024-26202 [HIGH] CWE-122 DHCP Server Service Remote Code Execution Vulnerability
DHCP Server Service Remote Code Execution Vulnerability
FAQ: According to the CVSS metric, privileges required is high (PR:H). What does that mean for this vulnerability?
Successful exploitation of this vulnerability requires the attacker or targeted user to have specific elevated privileges. As is best practice, regular validation and audits of administrative groups should be conducted.
Windows DHCP Server:
msrc
CVE-2024-26214HIGHCVSS 8.82024-04-09
CVE-2024-26214 [HIGH] CWE-122 Microsoft WDAC SQL Server ODBC Driver Remote Code Execution Vulnerability
Microsoft WDAC SQL Server ODBC Driver Remote Code Execution Vulnerability
FAQ: According to the CVSS metric, the attack vector is network (AV:N) and the user interaction is required (UI:R). What is the target context of the remote code execution?
An authenticated victim who is connected to the network must be tricked or persuaded to connect to a malicious SQL database using their SQL client a
msrc
CVE-2024-26194HIGHCVSS 7.42024-04-09
CVE-2024-26194 [MEDIUM] CWE-347 Secure Boot Security Feature Bypass Vulnerability
Secure Boot Security Feature Bypass Vulnerability
FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?
Successful exploitation of this vulnerability requires an attacker to gather information specific to the environment of the targeted component.
FAQ: What kind of security feature could be bypassed by successfully exploiting this vulnerability?
An at
msrc
CVE-2024-28923HIGHCVSS 6.72024-04-09
CVE-2024-28923 [MEDIUM] CWE-190 Secure Boot Security Feature Bypass Vulnerability
Secure Boot Security Feature Bypass Vulnerability
FAQ: What kind of security feature could be bypassed by successfully exploiting this vulnerability?
An attacker who successfully exploited this vulnerability could bypass Secure Boot.
FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?
Successful exploitation of this vulnerability requires an attacke
msrc
CVE-2024-26237HIGHCVSS 7.82024-04-09
CVE-2024-26237 [HIGH] CWE-416 Windows Defender Credential Guard Elevation of Privilege Vulnerability
Windows Defender Credential Guard Elevation of Privilege Vulnerability
FAQ: What privileges could be gained by an attacker who successfully exploited the vulnerability?
A domain user could use this vulnerability to elevate privileges to SYSTEM assigned integrity level.
Windows Defender Credential Guard: Windows Defender Credential Guard
Microsoft: Microsoft
Customer Action Required: Yes
Impa
msrc
CVE-2024-26195HIGHCVSS 7.22024-04-09
CVE-2024-26195 [HIGH] CWE-122 DHCP Server Service Remote Code Execution Vulnerability
DHCP Server Service Remote Code Execution Vulnerability
FAQ: According to the CVSS metric, privileges required is high (PR:H). What does that mean for this vulnerability?
Successful exploitation of this vulnerability requires the attacker or targeted user to have specific elevated privileges. As is best practice, regular validation and audits of administrative groups should be conducted.
Windows DHCP Server:
msrc
CVE-2024-28925HIGHCVSS 8.02024-04-09
CVE-2024-28925 [MEDIUM] CWE-121 Secure Boot Security Feature Bypass Vulnerability
Secure Boot Security Feature Bypass Vulnerability
FAQ: According to the CVSS metric, the attack vector is adjacent (AV:A). What does that mean for this vulnerability?
An authenticated attacker could exploit this vulnerability with LAN access.
FAQ: What kind of security feature could be bypassed by successfully exploiting this vulnerability?
An attacker who successfully exploited this vulnerability could bypass Se
msrc
CVE-2024-26227HIGHCVSS 7.22024-04-09
CVE-2024-26227 [HIGH] CWE-416 Windows DNS Server Remote Code Execution Vulnerability
Windows DNS Server Remote Code Execution Vulnerability
FAQ: How could an attacker exploit this vulnerability?
In a network-based attack an attacker would need to have the privileges to query the Domain Name Service (DNS). If the timing of DNS queries is perfect, the attacker could execute code remotely on the target server.
Role: DNS Server: Role: DNS Server
Microsoft: Microsoft
Customer Action Required: Yes
msrc
CVE-2024-26232HIGHCVSS 7.32024-04-09
CVE-2024-26232 [HIGH] CWE-843 Microsoft Message Queuing (MSMQ) Remote Code Execution Vulnerability
Microsoft Message Queuing (MSMQ) Remote Code Execution Vulnerability
FAQ: According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution?
The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally.
msrc
CVE-2024-26231HIGHCVSS 7.22024-04-09
CVE-2024-26231 [HIGH] CWE-416 Windows DNS Server Remote Code Execution Vulnerability
Windows DNS Server Remote Code Execution Vulnerability
FAQ: How could an attacker exploit this vulnerability?
In a network-based attack an attacker would need to have the privileges to query the Domain Name Service (DNS). If the timing of DNS queries is perfect, the attacker could execute code remotely on the target server.
Role: DNS Server: Role: DNS Server
Microsoft: Microsoft
Customer Action Required: Yes
msrc
CVE-2024-29988HIGHCVSS 8.8KEV2024-04-09
CVE-2024-29988 [HIGH] CWE-693 SmartScreen Prompt Security Feature Bypass Vulnerability
SmartScreen Prompt Security Feature Bypass Vulnerability
FAQ: How could an attacker exploit the vulnerability?
In an email or instant message attack scenario, the attacker could send the targeted user a specially crafted file that is designed to exploit the remote code execution vulnerability.
In any case an attacker would have no way to force a user to view attacker-controlled content. Instead, an attacker w
msrc
CVE-2024-20693HIGHCVSS 7.82024-04-09
CVE-2024-20693 [HIGH] CWE-426 Windows Kernel Elevation of Privilege Vulnerability
Windows Kernel Elevation of Privilege Vulnerability
FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability?
An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.
Windows Kernel: Windows Kernel
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Elevation of Privilege
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest So
msrc
CVE-2024-26222HIGHCVSS 7.22024-04-09
CVE-2024-26222 [HIGH] CWE-416 Windows DNS Server Remote Code Execution Vulnerability
Windows DNS Server Remote Code Execution Vulnerability
FAQ: How could an attacker exploit this vulnerability?
In a network-based attack an attacker would need to have the privileges to query the Domain Name Service (DNS). If the timing of DNS queries is perfect, the attacker could execute code remotely on the target server.
Role: DNS Server: Role: DNS Server
Microsoft: Microsoft
Customer Action Required: Yes
msrc
CVE-2024-26221HIGHCVSS 7.22024-04-09
CVE-2024-26221 [HIGH] CWE-416 Windows DNS Server Remote Code Execution Vulnerability
Windows DNS Server Remote Code Execution Vulnerability
FAQ: How could an attacker exploit this vulnerability?
In a network-based attack an attacker would need to have the privileges to query the Domain Name Service (DNS). If the timing of DNS queries is perfect, the attacker could execute code remotely on the target server.
Role: DNS Server: Role: DNS Server
Microsoft: Microsoft
Customer Action Required: Yes
msrc
CVE-2024-26228HIGHCVSS 7.82024-04-09
CVE-2024-26228 [HIGH] CWE-310 Windows Cryptographic Services Security Feature Bypass Vulnerability
Windows Cryptographic Services Security Feature Bypass Vulnerability
FAQ: What kind of security feature could be bypassed by successfully exploiting this vulnerability?
An attacker who successfully exploited this vulnerability could bypass RSA signature verification on a vulnerable system.
Windows Cryptographic Services: Windows Cryptographic Services
Microsoft: Microsoft
Customer Action Requir
msrc
CVE-2024-26254HIGHCVSS 7.52024-04-09
CVE-2024-26254 [HIGH] CWE-822 Microsoft Virtual Machine Bus (VMBus) Denial of Service Vulnerability
Microsoft Virtual Machine Bus (VMBus) Denial of Service Vulnerability
Windows Virtual Machine Bus: Windows Virtual Machine Bus
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Denial of Service
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;DOS:N/A
Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5036896
R
msrc
CVE-2024-26224HIGHCVSS 7.22024-04-09
CVE-2024-26224 [HIGH] CWE-416 Windows DNS Server Remote Code Execution Vulnerability
Windows DNS Server Remote Code Execution Vulnerability
FAQ: How could an attacker exploit this vulnerability?
In a network-based attack an attacker would need to have the privileges to query the Domain Name Service (DNS). If the timing of DNS queries is perfect, the attacker could execute code remotely on the target server.
Role: DNS Server: Role: DNS Server
Microsoft: Microsoft
Customer Action Required: Yes
msrc
CVE-2024-26218HIGHCVSS 7.82024-04-09
CVE-2024-26218 [HIGH] CWE-367 Windows Kernel Elevation of Privilege Vulnerability
Windows Kernel Elevation of Privilege Vulnerability
FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability?
An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.
Windows Kernel: Windows Kernel
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Elevation of Privilege
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest So
msrc
CVE-2024-26233HIGHCVSS 7.22024-04-09
CVE-2024-26233 [HIGH] CWE-416 Windows DNS Server Remote Code Execution Vulnerability
Windows DNS Server Remote Code Execution Vulnerability
FAQ: How could an attacker exploit this vulnerability?
In a network-based attack an attacker would need to have the privileges to query the Domain Name Service (DNS). If the timing of DNS queries is perfect, the attacker could execute code remotely on the target server.
Role: DNS Server: Role: DNS Server
Microsoft: Microsoft
Customer Action Required: Yes
msrc