Msrc Windows Server 2022 vulnerabilities

2,339 known vulnerabilities affecting msrc/windows_server_2022.

Total CVEs
2,339
CISA KEV
88
actively exploited
Public exploits
38
Exploited in wild
65
Severity breakdown
CRITICAL52HIGH1626MEDIUM652LOW9

Vulnerabilities

Page 102 of 117
CVE-2022-35833HIGHCVSS 7.52022-09-13
CVE-2022-35833 [HIGH] Windows Secure Channel Denial of Service Vulnerability Windows Secure Channel Denial of Service Vulnerability Windows Transport Security Layer (TLS): Windows Transport Security Layer (TLS) Microsoft: Microsoft Customer Action Required: Yes Impact: Denial of Service Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A Reference: https://catalog.update.microsoft.com/v7
msrc
CVE-2022-35830HIGHCVSS 8.12022-09-13
CVE-2022-35830 [HIGH] Remote Procedure Call Runtime Remote Code Execution Vulnerability Remote Procedure Call Runtime Remote Code Execution Vulnerability FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability? Successful exploitation of this vulnerability requires an attacker to invest time in repeated exploitation attempts through sending constant or intermittent data. FAQ: How could an attacker exploit this vulnerability? An unauth
msrc
CVE-2022-33679HIGHCVSS 8.12022-09-13
CVE-2022-33679 [HIGH] Windows Kerberos Elevation of Privilege Vulnerability Windows Kerberos Elevation of Privilege Vulnerability FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability? The attacker must inject themselves into the logical network path between the target and the resource requested by the victim to read or modify network communications. This is called a machine-in-the-middle (MITM) attack. FAQ: What privileges could be
msrc
CVE-2022-37954HIGHCVSS 7.82022-09-13
CVE-2022-37954 [HIGH] DirectX Graphics Kernel Elevation of Privilege Vulnerability DirectX Graphics Kernel Elevation of Privilege Vulnerability FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. Microsoft Graphics Component: Microsoft Graphics Component Microsoft: Microsoft Customer Action Required: Yes Impact: Elevation of Privilege Exploit Status: Public
msrc
CVE-2022-35841HIGHCVSS 8.82022-09-13
CVE-2022-35841 [HIGH] Windows Enterprise App Management Service Remote Code Execution Vulnerability Windows Enterprise App Management Service Remote Code Execution Vulnerability FAQ: How could an attacker exploit this vulnerability? The Enterprise App Management service exposes a COM class that could allow an authenticated attacker to install arbitrary SYSTEM services that run with SYSTEM privileges, which could result in remote code execution. Windows Enterprise App Management: Windows Enterp
msrc
CVE-2022-26928HIGHCVSS 7.0Exploited2022-09-13
CVE-2022-26928 [HIGH] Windows Photo Import API Elevation of Privilege Vulnerability Windows Photo Import API Elevation of Privilege Vulnerability FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability? Successful exploitation of this vulnerability requires an attacker to win a race condition. FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this
msrc
CVE-2022-35838HIGHCVSS 7.52022-09-13
CVE-2022-35838 [HIGH] HTTP V3 Denial of Service Vulnerability HTTP V3 Denial of Service Vulnerability Windows HTTP.sys: Windows HTTP.sys Microsoft: Microsoft Customer Action Required: Yes Impact: Denial of Service Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5017316 Reference: https://support.microsoft.com/he
msrc
CVE-2022-37957HIGHCVSS 7.82022-09-13
CVE-2022-37957 [HIGH] Windows Kernel Elevation of Privilege Vulnerability Windows Kernel Elevation of Privilege Vulnerability FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. Windows Kernel: Windows Kernel Microsoft: Microsoft Customer Action Required: Yes Impact: Elevation of Privilege Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software R
msrc
CVE-2022-37958HIGHCVSS 8.12022-09-13
CVE-2022-37958 [HIGH] SPNEGO Extended Negotiation (NEGOEX) Security Mechanism Remote Code Execution Vulnerability SPNEGO Extended Negotiation (NEGOEX) Security Mechanism Remote Code Execution Vulnerability FAQ: What is SPNEGO Extended Negotiation? The SPNEGO Extended Negotiation Security Mechanism (NEGOEX) extends Simple and Protected GSS-API Negotiation Mechanism (SPNEGO) described in [RFC4178]. Please see SPNEGO Overview for more information. FAQ: According to the CVSS metric, the attack com
msrc
CVE-2022-34725HIGHCVSS 7.02022-09-13
CVE-2022-34725 [HIGH] Windows ALPC Elevation of Privilege Vulnerability Windows ALPC Elevation of Privilege Vulnerability FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability? Successful exploitation of this vulnerability requires an attacker to wi
msrc
CVE-2022-35832MEDIUMCVSS 5.52022-09-13
CVE-2022-35832 [MEDIUM] Windows Event Tracing Denial of Service Vulnerability Windows Event Tracing Denial of Service Vulnerability Windows Event Tracing: Windows Event Tracing Microsoft: Microsoft Customer Action Required: Yes Impact: Denial of Service Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5017315 Ref
msrc
CVE-2022-35831MEDIUMCVSS 5.52022-09-13
CVE-2022-35831 [MEDIUM] Windows Remote Access Connection Manager Information Disclosure Vulnerability Windows Remote Access Connection Manager Information Disclosure Vulnerability FAQ: What type of information could be disclosed by this vulnerability? An attacker who successfully exploited this vulnerability could potentially read small portions of heap memory. Windows Remote Access Connection Manager: Windows Remote Access Connection Manager Microsoft: Microsoft Customer Action Required: Ye
msrc
CVE-2022-37959MEDIUMCVSS 6.52022-09-13
CVE-2022-37959 [MEDIUM] Network Device Enrollment Service (NDES) Security Feature Bypass Vulnerability Network Device Enrollment Service (NDES) Security Feature Bypass Vulnerability FAQ: What kind of security feature could be bypassed by successfully exploiting this vulnerability? An attacker who successfully exploited this could bypass the Network Device Enrollment (NDES) Services' cryptographic service provider. Network Device Enrollment Service (NDES): Network Device Enrollment Service (NDE
msrc
CVE-2022-34715CRITICALCVSS 9.82022-08-09
CVE-2022-34715 [CRITICAL] Windows Network File System Remote Code Execution Vulnerability Windows Network File System Remote Code Execution Vulnerability FAQ: How could an attacker exploit this vulnerability? This vulnerability could be exploited over the network by making an unauthenticated, specially crafted call to a Network File System (NFS) service to trigger a Remote Code Execution (RCE). FAQ: What version of Network File System (NFS) is affected by this vulnerability? Servers that have
msrc
CVE-2022-35763HIGHCVSS 7.82022-08-09
CVE-2022-35763 [HIGH] Storage Spaces Direct Elevation of Privilege Vulnerability Storage Spaces Direct Elevation of Privilege Vulnerability FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. FAQ: According to the CVSS metric, privileges required is low (PR:L). What does that mean for this vulnerability? Any authenticated user could trigger this vulnerability.
msrc
CVE-2022-35771HIGHCVSS 7.82022-08-09
CVE-2022-35771 [HIGH] Windows Defender Credential Guard Elevation of Privilege Vulnerability Windows Defender Credential Guard Elevation of Privilege Vulnerability FAQ: What privileges could be gained by an attacker who successfully exploited the vulnerability? A domain user could use this vulnerability to elevate privileges to SYSTEM assigned integrity level. Windows Defender Credential Guard: Windows Defender Credential Guard Microsoft: Microsoft Customer Action Required: Yes Impact: Elev
msrc
CVE-2022-35795HIGHCVSS 7.82022-08-09
CVE-2022-35795 [HIGH] Windows Error Reporting Service Elevation of Privilege Vulnerability Windows Error Reporting Service Elevation of Privilege Vulnerability FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. Windows Error Reporting: Windows Error Reporting Microsoft: Microsoft Customer Action Required: Yes Impact: Elevation of Privilege Exploit Status:
msrc
CVE-2022-35751HIGHCVSS 7.82022-08-09
CVE-2022-35751 [HIGH] Windows Hyper-V Elevation of Privilege Vulnerability Windows Hyper-V Elevation of Privilege Vulnerability FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability? Successful exploitation of this vulnerability requires an attacker to win a race condition. FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability coul
msrc
CVE-2022-35748HIGHCVSS 7.52022-08-09
CVE-2022-35748 [HIGH] HTTP.sys Denial of Service Vulnerability HTTP.sys Denial of Service Vulnerability FAQ: How could an attacker exploit this vulnerability? In most situations, an unauthenticated attacker could send a specially crafted packet to a targeted server utilizing the Server Name Indication (SNI) over HTTP Protocol Stack (http.sys) to process packets, causing a denial of service (DOS). Windows Internet Information Services: Windows Internet Information Services Microsoft: Microsoft
msrc
CVE-2022-34705HIGHCVSS 7.82022-08-09
CVE-2022-34705 [HIGH] Windows Defender Credential Guard Elevation of Privilege Vulnerability Windows Defender Credential Guard Elevation of Privilege Vulnerability FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. Windows Defender Credential Guard: Windows Defender Credential Guard Microsoft: Microsoft Customer Action Required: Yes Impact: Elevation of Pri
msrc
Msrc Windows Server 2022 vulnerabilities | cvebase