Msrc Windows Server 2022 vulnerabilities
2,339 known vulnerabilities affecting msrc/windows_server_2022.
Total CVEs
2,339
CISA KEV
88
actively exploited
Public exploits
35
Exploited in wild
65
Severity breakdown
CRITICAL52HIGH1626MEDIUM652LOW9
Vulnerabilities
Page 12 of 117
CVE-2025-59193HIGHCVSS 7.02025-10-14
CVE-2025-59193 [HIGH] CWE-362 Windows Management Services Elevation of Privilege Vulnerability
Windows Management Services Elevation of Privilege Vulnerability
Description: Concurrent execution using shared resource with improper synchronization ('race condition') in Windows Management Services allows an authorized attacker to elevate privileges locally.
FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?
Successful exploitation
msrc
CVE-2025-55680HIGHCVSS 7.82025-10-14
CVE-2025-55680 [HIGH] CWE-367 Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability
Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability
Description: Time-of-check time-of-use (toctou) race condition in Windows Cloud Files Mini Filter Driver allows an authorized attacker to elevate privileges locally.
FAQ: What privileges could be gained by an attacker who successfully exploited the vulnerability?
A domain user could use this vulnerability to elevat
msrc
CVE-2025-55681HIGHCVSS 7.02025-10-14
CVE-2025-55681 [HIGH] CWE-125 Desktop Window Manager Elevation of Privilege Vulnerability
Desktop Window Manager Elevation of Privilege Vulnerability
Description: Out-of-bounds read in Windows DWM allows an authorized attacker to elevate privileges locally.
FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?
Successful exploitation of this vulnerability requires an attacker to manipulate system operations in a specific manner.
F
msrc
CVE-2025-58730HIGHCVSS 7.02025-10-14
CVE-2025-58730 [HIGH] CWE-416 Inbox COM Objects (Global Memory) Remote Code Execution Vulnerability
Inbox COM Objects (Global Memory) Remote Code Execution Vulnerability
Description: Use after free in Inbox COM Objects allows an unauthorized attacker to execute code locally.
FAQ: According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?
An attacker must send a user a malicious Office file and convince them to open it.
FAQ: According to the
msrc
CVE-2025-59255HIGHCVSS 7.82025-10-14
CVE-2025-59255 [HIGH] CWE-122 Windows DWM Core Library Elevation of Privilege Vulnerability
Windows DWM Core Library Elevation of Privilege Vulnerability
Description: Heap-based buffer overflow in Windows DWM Core Library allows an authorized attacker to elevate privileges locally.
FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability?
An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.
Windows DWM Core Library: W
msrc
CVE-2025-55692HIGHCVSS 7.82025-10-14
CVE-2025-55692 [HIGH] CWE-20 Windows Error Reporting Service Elevation of Privilege Vulnerability
Windows Error Reporting Service Elevation of Privilege Vulnerability
Description: Improper input validation in Windows Error Reporting allows an authorized attacker to elevate privileges locally.
FAQ: What privileges could be gained by an attacker who successfully exploited the vulnerability?
An attacker who successfully exploited this vulnerability could gain administrator privileges.
Windows Er
msrc
CVE-2025-24990HIGHCVSS 7.8KEV2025-10-14
CVE-2025-24990 [HIGH] CWE-822 Windows Agere Modem Driver Elevation of Privilege Vulnerability
Windows Agere Modem Driver Elevation of Privilege Vulnerability
Description: Microsoft is aware of vulnerabilities in the third party Agere Modem driver that ships natively with supported Windows operating systems. This is an announcement of the upcoming removal of ltmdm64.sys driver. The driver has been removed in the October cumulative update.
Fax modem hardware dependent on this specific driver will
msrc
CVE-2025-58722HIGHCVSS 7.82025-10-14
CVE-2025-58722 [HIGH] CWE-122 Microsoft DWM Core Library Elevation of Privilege Vulnerability
Microsoft DWM Core Library Elevation of Privilege Vulnerability
Description: Heap-based buffer overflow in Windows DWM allows an authorized attacker to elevate privileges locally.
FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability?
An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.
Windows DWM: Windows DWM
Microsoft:
msrc
CVE-2025-58732HIGHCVSS 7.02025-10-14
CVE-2025-58732 [HIGH] CWE-416 Inbox COM Objects (Global Memory) Remote Code Execution Vulnerability
Inbox COM Objects (Global Memory) Remote Code Execution Vulnerability
Description: Use after free in Inbox COM Objects allows an unauthorized attacker to execute code locally.
FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?
Successful exploitation of this vulnerability requires an attacker to win a race condition.
FAQ: Accordi
msrc
CVE-2025-58738HIGHCVSS 7.02025-10-14
CVE-2025-58738 [HIGH] CWE-416 Inbox COM Objects (Global Memory) Remote Code Execution Vulnerability
Inbox COM Objects (Global Memory) Remote Code Execution Vulnerability
Description: Use after free in Inbox COM Objects allows an unauthorized attacker to execute code locally.
FAQ: According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?
An attacker must send a user a malicious Office file and convince them to open it.
FAQ: According to the
msrc
CVE-2025-50152HIGHCVSS 7.82025-10-14
CVE-2025-50152 [HIGH] CWE-125 Windows Kernel Elevation of Privilege Vulnerability
Windows Kernel Elevation of Privilege Vulnerability
Description: Out-of-bounds read in Windows Kernel allows an authorized attacker to elevate privileges locally.
FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability?
An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.
Windows Kernel: Windows Kernel
Microsoft: Microsoft
Customer Ac
msrc
CVE-2025-59207HIGHCVSS 7.82025-10-14
CVE-2025-59207 [HIGH] CWE-822 Windows Kernel Elevation of Privilege Vulnerability
Windows Kernel Elevation of Privilege Vulnerability
Description: Untrusted pointer dereference in Windows Kernel allows an authorized attacker to elevate privileges locally.
FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability?
An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.
Windows Kernel: Windows Kernel
Microsoft: Microsoft
msrc
CVE-2025-59277HIGHCVSS 7.82025-10-14
CVE-2025-59277 [HIGH] CWE-1287 Windows Authentication Elevation of Privilege Vulnerability
Windows Authentication Elevation of Privilege Vulnerability
Description: Improper validation of specified type of input in Windows Authentication Methods allows an authorized attacker to elevate privileges locally.
FAQ: How could an attacker exploit this vulnerability?
To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted appli
msrc
CVE-2025-58733HIGHCVSS 7.02025-10-14
CVE-2025-58733 [HIGH] CWE-416 Inbox COM Objects (Global Memory) Remote Code Execution Vulnerability
Inbox COM Objects (Global Memory) Remote Code Execution Vulnerability
Description: Use after free in Inbox COM Objects allows an unauthorized attacker to execute code locally.
FAQ: According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?
An attacker must send a user a malicious Office file and convince them to open it.
FAQ: According to the
msrc
CVE-2025-59195HIGHCVSS 7.02025-10-14
CVE-2025-59195 [HIGH] CWE-362 Windows Graphics Component Denial of Service Vulnerability
Windows Graphics Component Denial of Service Vulnerability
Description: Concurrent execution using shared resource with improper synchronization ('race condition') in Microsoft Graphics Component allows an authorized attacker to deny service locally.
FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?
Successful exploitation of this vulnerabi
msrc
CVE-2025-59191HIGHCVSS 7.82025-10-14
CVE-2025-59191 [HIGH] CWE-122 Windows Connected Devices Platform Service Elevation of Privilege Vulnerability
Windows Connected Devices Platform Service Elevation of Privilege Vulnerability
Description: Heap-based buffer overflow in Connected Devices Platform Service (Cdpsvc) allows an authorized attacker to elevate privileges locally.
FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability?
An attacker who successfully exploited this vulnerability cou
msrc
CVE-2025-59254HIGHCVSS 7.8PoC2025-10-14
CVE-2025-59254 [HIGH] CWE-122 Microsoft DWM Core Library Elevation of Privilege Vulnerability
Microsoft DWM Core Library Elevation of Privilege Vulnerability
Description: Heap-based buffer overflow in Windows DWM Core Library allows an authorized attacker to elevate privileges locally.
FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability?
An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.
Windows DWM Core Librar
msrc
CVE-2025-58731HIGHCVSS 7.02025-10-14
CVE-2025-58731 [HIGH] CWE-416 Inbox COM Objects (Global Memory) Remote Code Execution Vulnerability
Inbox COM Objects (Global Memory) Remote Code Execution Vulnerability
Description: Use after free in Inbox COM Objects allows an unauthorized attacker to execute code locally.
FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?
Successful exploitation of this vulnerability requires an attacker to win a race condition.
FAQ: Accordi
msrc
CVE-2025-59202HIGHCVSS 7.02025-10-14
CVE-2025-59202 [HIGH] CWE-416 Windows Remote Desktop Services Elevation of Privilege Vulnerability
Windows Remote Desktop Services Elevation of Privilege Vulnerability
Description: Use after free in Windows Remote Desktop Services allows an authorized attacker to elevate privileges locally.
FAQ: What privileges could be gained by an attacker who successfully exploited the vulnerability?
An attacker who successfully exploited this vulnerability could gain administrator privileges.
FAQ: Accordi
msrc
CVE-2025-54957HIGHCVSS 7.02025-10-14
CVE-2025-54957 [CRITICAL] CWE-502 MITRE CVE-2025-54957: Integer overflow in Dolby Digital Plus audio decoder
MITRE CVE-2025-54957: Integer overflow in Dolby Digital Plus audio decoder
Description: Deserialization of untrusted data in Microsoft Windows Codecs Library allows an unauthorized attacker to execute code locally.
FAQ: According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?
An attacker must send a user a malicious Office file and c
msrc