Msrc Windows Server 2022 vulnerabilities

2,339 known vulnerabilities affecting msrc/windows_server_2022.

Total CVEs
2,339
CISA KEV
88
actively exploited
Public exploits
38
Exploited in wild
65
Severity breakdown
CRITICAL52HIGH1626MEDIUM652LOW9

Vulnerabilities

Page 111 of 117
CVE-2022-23288HIGHCVSS 7.02022-03-08
CVE-2022-23288 [HIGH] Windows DWM Core Library Elevation of Privilege Vulnerability Windows DWM Core Library Elevation of Privilege Vulnerability FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability? Successful exploitation of this vulnerability requires an attacker to win a race condition. Windows DWM Core Library: Windows DWM Core Library Microsoft: Microsoft Customer Action Required: Yes Impact: Elevation of Privilege Exploi
msrc
CVE-2022-23284HIGHCVSS 7.22022-03-08
CVE-2022-23284 [HIGH] Windows Print Spooler Elevation of Privilege Vulnerability Windows Print Spooler Elevation of Privilege Vulnerability Windows Print Spooler Components: Windows Print Spooler Components Microsoft: Microsoft Customer Action Required: Yes Impact: Elevation of Privilege Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A Reference: https://catalog.update.microsoft.com/v
msrc
CVE-2022-23287HIGHCVSS 7.02022-03-08
CVE-2022-23287 [HIGH] Windows ALPC Elevation of Privilege Vulnerability Windows ALPC Elevation of Privilege Vulnerability FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability? Successful exploitation of this vulnerability requires an attacker to win a race condition. Windows ALPC: Windows ALPC Microsoft: Microsoft Customer Action Required: Yes Impact: Elevation of Privilege Exploit Status: Publicly Disclosed:No;Exploited:No;Lat
msrc
CVE-2022-24460HIGHCVSS 7.02022-03-08
CVE-2022-24460 [HIGH] Tablet Windows User Interface Application Elevation of Privilege Vulnerability Tablet Windows User Interface Application Elevation of Privilege Vulnerability FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability? Successful exploitation of this vulnerability requires an attacker to win a race condition. Tablet Windows User Interface: Tablet Windows User Interface Microsoft: Microsoft Customer Action Required:
msrc
CVE-2022-22010MEDIUMCVSS 4.42022-03-08
CVE-2022-22010 [MEDIUM] Media Foundation Information Disclosure Vulnerability Media Foundation Information Disclosure Vulnerability FAQ: What type of information could be disclosed by this vulnerability? An attacker who successfully exploited this vulnerability could potentially read small portions of heap memory. Microsoft Windows Codecs Library: Microsoft Windows Codecs Library Microsoft: Microsoft Customer Action Required: Yes Impact: Information Disclosure Exploit Status: Publicly Disc
msrc
CVE-2022-21975MEDIUMCVSS 4.72022-03-08
CVE-2022-21975 [MEDIUM] Windows Hyper-V Denial of Service Vulnerability Windows Hyper-V Denial of Service Vulnerability FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability? Successful exploitation of this vulnerability requires an attacker to win a race condition. Role: Windows Hyper-V: Role: Windows Hyper-V Microsoft: Microsoft Customer Action Required: Yes Impact: Denial of Service Exploit Status: Publicly Disclosed:No;Explo
msrc
CVE-2022-21977LOWCVSS 3.32022-03-08
CVE-2022-21977 [LOW] Media Foundation Information Disclosure Vulnerability Media Foundation Information Disclosure Vulnerability FAQ: What type of information could be disclosed by this vulnerability? An attacker who successfully exploited this vulnerability could potentially read small portions of heap memory. Microsoft Windows Codecs Library: Microsoft Windows Codecs Library Microsoft: Microsoft Customer Action Required: Yes Impact: Information Disclosure Exploit Status: Publicly Disclos
msrc
CVE-2022-21984HIGHCVSS 8.82022-02-08
CVE-2022-21984 [HIGH] Windows DNS Server Remote Code Execution Vulnerability Windows DNS Server Remote Code Execution Vulnerability Role: DNS Server: Role: DNS Server Microsoft: Microsoft Customer Action Required: Yes Impact: Remote Code Execution Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010345 Reference
msrc
CVE-2022-21993HIGHCVSS 7.52022-02-08
CVE-2022-21993 [HIGH] Windows Services for NFS ONCRPC XDR Driver Information Disclosure Vulnerability Windows Services for NFS ONCRPC XDR Driver Information Disclosure Vulnerability FAQ: What type of information could be disclosed by this vulnerability? The type of information that could be disclosed if an attacker successfully exploited this vulnerability is uninitialized memory and kernel memory - unintentional read access to memory contents in kernel space from a user mode process. Windows
msrc
CVE-2022-21974HIGHCVSS 7.82022-02-08
CVE-2022-21974 [HIGH] Roaming Security Rights Management Services Remote Code Execution Vulnerability Roaming Security Rights Management Services Remote Code Execution Vulnerability FAQ: According to the CVSS score, the Attack Vector is Local. Why does the CVE title indicate that this is a Remote Code Execution? The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution/"ACE". The attack itself is carried out lo
msrc
CVE-2022-21995HIGHCVSS 7.92022-02-08
CVE-2022-21995 [HIGH] Windows Hyper-V Remote Code Execution Vulnerability Windows Hyper-V Remote Code Execution Vulnerability FAQ: According to the CVSS metric, a successful exploitation could lead to a scope change (S:C). What does this mean for this vulnerability? In this case, a successful attack could be performed from a low privilege Hyper-V guest. The attacker could traverse the guest's security boundary to execute code on the Hyper-V host execution environment. FAQ: According to the CVS
msrc
CVE-2022-22001HIGHCVSS 7.82022-02-08
CVE-2022-22001 [HIGH] Windows Remote Access Connection Manager Elevation of Privilege Vulnerability Windows Remote Access Connection Manager Elevation of Privilege Vulnerability Windows Remote Access Connection Manager: Windows Remote Access Connection Manager Microsoft: Microsoft Customer Action Required: Yes Impact: Elevation of Privilege Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:
msrc
CVE-2022-22715HIGHCVSS 7.82022-02-08
CVE-2022-22715 [HIGH] Named Pipe File System Elevation of Privilege Vulnerability Named Pipe File System Elevation of Privilege Vulnerability Windows Named Pipe File System: Windows Named Pipe File System Microsoft: Microsoft Customer Action Required: Yes Impact: Elevation of Privilege Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation More Likely;Older Software Release:Exploitation More Likely;DOS:N/A Reference: https://catalog.update.microsoft.com/v7/
msrc
CVE-2022-21971HIGHCVSS 7.8KEV2022-02-08
CVE-2022-21971 [HIGH] Windows Runtime Remote Code Execution Vulnerability Windows Runtime Remote Code Execution Vulnerability FAQ: According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution? The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally. For example, when the score indicates tha
msrc
CVE-2022-21994HIGHCVSS 7.82022-02-08
CVE-2022-21994 [HIGH] Windows DWM Core Library Elevation of Privilege Vulnerability Windows DWM Core Library Elevation of Privilege Vulnerability Windows DWM Core Library: Windows DWM Core Library Microsoft: Microsoft Customer Action Required: Yes Impact: Elevation of Privilege Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation More Likely;Older Software Release:Exploitation More Likely;DOS:N/A Reference: https://catalog.update.microsoft.com/v7/site/Sea
msrc
CVE-2022-21992HIGHCVSS 7.82022-02-08
CVE-2022-21992 [HIGH] Windows Mobile Device Management Remote Code Execution Vulnerability Windows Mobile Device Management Remote Code Execution Vulnerability FAQ: According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution? The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally. For exa
msrc
CVE-2022-22002MEDIUMCVSS 5.52022-02-08
CVE-2022-22002 [MEDIUM] Windows User Account Profile Picture Denial of Service Vulnerability Windows User Account Profile Picture Denial of Service Vulnerability Windows User Account Profile: Windows User Account Profile Microsoft: Microsoft Customer Action Required: Yes Impact: Denial of Service Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A Reference: https://catalog.update.micros
msrc
CVE-2022-22712MEDIUMCVSS 5.62022-02-08
CVE-2022-22712 [MEDIUM] Windows Hyper-V Denial of Service Vulnerability Windows Hyper-V Denial of Service Vulnerability FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability? Successful exploitation of this vulnerability requires an attacker to take additional actions prior to exploitation to prepare the target environment. FAQ: According to the CVSS metric, a successful exploitation could lead to a scope change (S:C). What does thi
msrc
CVE-2022-21849CRITICALCVSS 9.82022-01-11
CVE-2022-21849 [CRITICAL] Windows Internet Key Exchange (IKE) Protocol Extensions Remote Code Execution Vulnerability Windows Internet Key Exchange (IKE) Protocol Extensions Remote Code Execution Vulnerability FAQ: How could an attacker exploit this vulnerability? In an environment where Internet Key Exchange (IKE) version 2 is enabled, a remote attacker could trigger multiple vulnerabilities without being authenticated. Windows IKE Extension: Windows IKE Extension Microsoft: Microsoft Custo
msrc
CVE-2021-22947CRITICALCVSS 5.92022-01-11
CVE-2021-22947 [MEDIUM] Open Source Curl Remote Code Execution Vulnerability Open Source Curl Remote Code Execution Vulnerability FAQ: Why is this a Hacker One CVE? This CVE is regarding a vulnerability in the curl open source library which is used by Windows. The January 2022 Windows Security Updates includes the most recent version of this library which addresses the vulnerability and others. Please see curl security problems for information on all of the vulnerabilities that have been addres
msrc