Msrc Windows Server 2022 vulnerabilities
2,339 known vulnerabilities affecting msrc/windows_server_2022.
Total CVEs
2,339
CISA KEV
88
actively exploited
Public exploits
38
Exploited in wild
65
Severity breakdown
CRITICAL52HIGH1626MEDIUM652LOW9
Vulnerabilities
Page 113 of 117
CVE-2022-21874HIGHCVSS 7.8Exploited2022-01-11
CVE-2022-21874 [HIGH] Windows Security Center API Remote Code Execution Vulnerability
Windows Security Center API Remote Code Execution Vulnerability
Windows Security Center: Windows Security Center
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Remote Code Execution
Exploit Status: Publicly Disclosed:Yes;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely
Reference: https://catalog.update.microsoft.com/v7/site/Search.as
msrc
CVE-2022-21888HIGHCVSS 7.82022-01-11
CVE-2022-21888 [HIGH] Windows Modern Execution Server Remote Code Execution Vulnerability
Windows Modern Execution Server Remote Code Execution Vulnerability
Windows Modern Execution Server: Windows Modern Execution Server
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Remote Code Execution
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely
Reference: https://catalog.update.microsof
msrc
CVE-2022-21878HIGHCVSS 7.82022-01-11
CVE-2022-21878 [HIGH] Windows Geolocation Service Remote Code Execution Vulnerability
Windows Geolocation Service Remote Code Execution Vulnerability
Windows Geolocation Service: Windows Geolocation Service
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Remote Code Execution
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely
Reference: https://catalog.update.microsoft.com/v7/site/Se
msrc
CVE-2022-21870HIGHCVSS 7.02022-01-11
CVE-2022-21870 [HIGH] Tablet Windows User Interface Application Core Elevation of Privilege Vulnerability
Tablet Windows User Interface Application Core Elevation of Privilege Vulnerability
Tablet Windows User Interface: Tablet Windows User Interface
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Elevation of Privilege
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely
Reference: ht
msrc
CVE-2022-21873HIGHCVSS 7.02022-01-11
CVE-2022-21873 [HIGH] Tile Data Repository Elevation of Privilege Vulnerability
Tile Data Repository Elevation of Privilege Vulnerability
Windows Tile Data Repository: Windows Tile Data Repository
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Elevation of Privilege
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely
Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx
msrc
CVE-2022-21865HIGHCVSS 7.02022-01-11
CVE-2022-21865 [HIGH] Connected Devices Platform Service Elevation of Privilege Vulnerability
Connected Devices Platform Service Elevation of Privilege Vulnerability
Windows Connected Devices Platform Service: Windows Connected Devices Platform Service
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Elevation of Privilege
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely
Reference:
msrc
CVE-2022-21863HIGHCVSS 7.02022-01-11
CVE-2022-21863 [HIGH] Windows StateRepository API Server file Elevation of Privilege Vulnerability
Windows StateRepository API Server file Elevation of Privilege Vulnerability
Windows StateRepository API: Windows StateRepository API
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Elevation of Privilege
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely
Reference: https://catalog.upda
msrc
CVE-2022-21852HIGHCVSS 7.82022-01-11
CVE-2022-21852 [HIGH] Windows DWM Core Library Elevation of Privilege Vulnerability
Windows DWM Core Library Elevation of Privilege Vulnerability
Windows DWM Core Library: Windows DWM Core Library
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Elevation of Privilege
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely
Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx
msrc
CVE-2022-21858HIGHCVSS 7.82022-01-11
CVE-2022-21858 [HIGH] Windows Bind Filter Driver Elevation of Privilege Vulnerability
Windows Bind Filter Driver Elevation of Privilege Vulnerability
Windows Bind Filter Driver: Windows Bind Filter Driver
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Elevation of Privilege
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely
Reference: https://catalog.update.microsoft.com/v7/site/Sea
msrc
CVE-2022-21910HIGHCVSS 7.82022-01-11
CVE-2022-21910 [HIGH] Microsoft Cluster Port Driver Elevation of Privilege Vulnerability
Microsoft Cluster Port Driver Elevation of Privilege Vulnerability
Windows Cluster Port Driver: Windows Cluster Port Driver
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Elevation of Privilege
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely
Reference: https://catalog.update.microsoft.com/v7/
msrc
CVE-2021-36976HIGHCVSS 6.52022-01-11
CVE-2021-36976 [MEDIUM] Libarchive Remote Code Execution Vulnerability
Libarchive Remote Code Execution Vulnerability
FAQ: Why is this a MITRE Corporation CVE?
CVE-2021-36976 is regarding a vulnerability in the libarchive open source library which is used by Windows. The January 2022 Windows Security Updates include the most recent version of this library which addresses the vulnerability and others. Please see libarchive CVEs for more information regarding all of the vulnerabilities that have
msrc
CVE-2022-21884HIGHCVSS 7.82022-01-11
CVE-2022-21884 [HIGH] Local Security Authority Subsystem Service Elevation of Privilege Vulnerability
Local Security Authority Subsystem Service Elevation of Privilege Vulnerability
Windows Local Security Authority Subsystem Service (LSASS): Windows Local Security Authority Subsystem Service (LSASS)
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Elevation of Privilege
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Softwa
msrc
CVE-2022-21876MEDIUMCVSS 5.52022-01-11
CVE-2022-21876 [MEDIUM] Win32k Information Disclosure Vulnerability
Win32k Information Disclosure Vulnerability
FAQ: What type of information could be disclosed by this vulnerability?
The type of information that could be disclosed if an attacker successfully exploited this vulnerability is the contents of Kernel memory. An attacker could read the contents of Kernel memory from a user mode process.
Windows Win32K: Windows Win32K
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Inf
msrc
CVE-2022-21906MEDIUMCVSS 5.52022-01-11
CVE-2022-21906 [MEDIUM] Windows Defender Application Control Security Feature Bypass Vulnerability
Windows Defender Application Control Security Feature Bypass Vulnerability
Windows Defender: Windows Defender
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Security Feature Bypass
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely
Reference: https://catalog.update.microsoft.com/v7/sit
msrc
CVE-2022-21961MEDIUMCVSS 6.82022-01-11
CVE-2022-21961 [MEDIUM] Windows Resilient File System (ReFS) Remote Code Execution Vulnerability
Windows Resilient File System (ReFS) Remote Code Execution Vulnerability
FAQ: According to the CVSS metric, the attack vector is physical (AV:P). What does that mean for this vulnerability?
An attacker with physical access to a vulnerable system could insert a specially crafted USB device.
Are there additional attack vectors?
This vulnerability could also be exploited through a local attack vector.
msrc
CVE-2022-21921MEDIUMCVSS 4.42022-01-11
CVE-2022-21921 [MEDIUM] Windows Defender Credential Guard Security Feature Bypass Vulnerability
Windows Defender Credential Guard Security Feature Bypass Vulnerability
Windows Defender: Windows Defender
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Security Feature Bypass
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely
Reference: https://catalog.update.microsoft.com/v7/site/Sear
msrc
CVE-2022-21900MEDIUMCVSS 4.62022-01-11
CVE-2022-21900 [MEDIUM] Windows Hyper-V Security Feature Bypass Vulnerability
Windows Hyper-V Security Feature Bypass Vulnerability
FAQ: What configurations or versions could be at risk from this vulnerability?
This bypass could affect any Hyper-V configurations that are using Router Guard.
What is the exposure if the vulnerability was bypassed?
Certain packets that would normally be blocked or dropped could be processed. This could allow an attacker to bypass set policy, potentially influencin
msrc
CVE-2022-21847MEDIUMCVSS 6.52022-01-11
CVE-2022-21847 [MEDIUM] Windows Hyper-V Denial of Service Vulnerability
Windows Hyper-V Denial of Service Vulnerability
Role: Windows Hyper-V: Role: Windows Hyper-V
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Denial of Service
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely
Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5009557
Reference: https://supp
msrc
CVE-2022-21958MEDIUMCVSS 6.82022-01-11
CVE-2022-21958 [MEDIUM] Windows Resilient File System (ReFS) Remote Code Execution Vulnerability
Windows Resilient File System (ReFS) Remote Code Execution Vulnerability
FAQ: According to the CVSS metric, the attack vector is physical (AV:P). What does that mean for this vulnerability?
An attacker with physical access to a vulnerable system could insert a specially crafted USB device.
Are there additional attack vectors?
This vulnerability could also be exploited through a local attack vector.
msrc
CVE-2022-21963MEDIUMCVSS 6.42022-01-11
CVE-2022-21963 [MEDIUM] Windows Resilient File System (ReFS) Remote Code Execution Vulnerability
Windows Resilient File System (ReFS) Remote Code Execution Vulnerability
FAQ: According to the CVSS metric, the attack vector is physical (AV:P). What does that mean for this vulnerability?
An attacker with physical access to a vulnerable system could insert a specially crafted USB device.
Are there additional attack vectors?
This vulnerability could also be exploited through a local attack vector.
msrc