Msrc Windows Server 2022 vulnerabilities

2,339 known vulnerabilities affecting msrc/windows_server_2022.

Total CVEs
2,339
CISA KEV
88
actively exploited
Public exploits
35
Exploited in wild
65
Severity breakdown
CRITICAL52HIGH1626MEDIUM652LOW9

Vulnerabilities

Page 26 of 117
CVE-2024-36350MEDIUMCVSS 5.62025-07-08
CVE-2024-36350 [MEDIUM] AMD: CVE-2024-36350 Transient Scheduler Attack in Store Queue AMD: CVE-2024-36350 Transient Scheduler Attack in Store Queue Description: The vulnerability assigned to this CVE is in certain processor models offered by AMD. The mitigation for this vulnerability requires a Windows update. This CVE is being documented in the Security Update Guide to announce that the latest builds of Windows enable the mitigation and provide protection against the vulnerability. Please see
msrc
CVE-2025-49658MEDIUMCVSS 5.52025-07-08
CVE-2025-49658 [MEDIUM] CWE-125 Windows Transport Driver Interface (TDI) Translation Driver Information Disclosure Vulnerability Windows Transport Driver Interface (TDI) Translation Driver Information Disclosure Vulnerability Description: Out-of-bounds read in Windows TDX.sys allows an authorized attacker to disclose information locally. FAQ: What type of information could be disclosed by this vulnerability? An attacker who successfully exploited this vulnerability could potentially read small
msrc
CVE-2025-48001MEDIUMCVSS 6.82025-07-08
CVE-2025-48001 [MEDIUM] CWE-367 Windows BitLocker Security Feature Bypass Vulnerability Windows BitLocker Security Feature Bypass Vulnerability Description: Time-of-check time-of-use (toctou) race condition in Windows BitLocker allows an unauthorized attacker to bypass a security feature with a physical attack. FAQ: What kind of security feature could be bypassed by successfully exploiting this vulnerability? A successful attacker could bypass the BitLocker Device Encryption feature on the sys
msrc
CVE-2025-49664MEDIUMCVSS 5.52025-07-08
CVE-2025-49664 [MEDIUM] CWE-200 Windows User-Mode Driver Framework Host Information Disclosure Vulnerability Windows User-Mode Driver Framework Host Information Disclosure Vulnerability Description: Exposure of sensitive information to an unauthorized actor in Windows User-Mode Driver Framework Host allows an authorized attacker to disclose information locally. FAQ: What type of information could be disclosed by this vulnerability? Exploiting this vulnerability could allow the disclosure of ce
msrc
CVE-2025-49684MEDIUMCVSS 5.52025-07-08
CVE-2025-49684 [MEDIUM] CWE-126 Windows Storage Port Driver Information Disclosure Vulnerability Windows Storage Port Driver Information Disclosure Vulnerability Description: Buffer over-read in Storage Port Driver allows an authorized attacker to disclose information locally. FAQ: What type of information could be disclosed by this vulnerability? The type of information that could be disclosed if an attacker successfully exploited this vulnerability is a small amount of kernel memory which co
msrc
CVE-2025-48804MEDIUMCVSS 6.82025-07-08
CVE-2025-48804 [MEDIUM] CWE-349 Windows BitLocker Security Feature Bypass Vulnerability Windows BitLocker Security Feature Bypass Vulnerability Description: Acceptance of extraneous untrusted data with trusted data in Windows BitLocker allows an unauthorized attacker to bypass a security feature with a physical attack. FAQ: What kind of security feature could be bypassed by successfully exploiting this vulnerability? A successful attacker could bypass the BitLocker Device Encryption feature on
msrc
CVE-2025-48818MEDIUMCVSS 6.82025-07-08
CVE-2025-48818 [MEDIUM] CWE-367 Windows BitLocker Security Feature Bypass Vulnerability Windows BitLocker Security Feature Bypass Vulnerability Description: Time-of-check time-of-use (toctou) race condition in Windows BitLocker allows an unauthorized attacker to bypass a security feature with a physical attack. FAQ: What kind of security feature could be bypassed by successfully exploiting this vulnerability? A successful attacker could bypass the BitLocker Device Encryption feature on the sys
msrc
CVE-2025-48800MEDIUMCVSS 6.82025-07-08
CVE-2025-48800 [MEDIUM] CWE-693 Windows BitLocker Security Feature Bypass Vulnerability Windows BitLocker Security Feature Bypass Vulnerability Description: Protection mechanism failure in Windows BitLocker allows an unauthorized attacker to bypass a security feature with a physical attack. FAQ: What kind of security feature could be bypassed by successfully exploiting this vulnerability? A successful attacker could bypass the BitLocker Device Encryption feature on the system storage device. A
msrc
CVE-2025-48823MEDIUMCVSS 5.92025-07-08
CVE-2025-48823 [MEDIUM] CWE-310 Windows Cryptographic Services Information Disclosure Vulnerability Windows Cryptographic Services Information Disclosure Vulnerability Description: Cryptographic issues in Windows Cryptographic Services allows an unauthorized attacker to disclose information over a network. FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability To exploit this vulnerability, an attacker would need to target an applica
msrc
CVE-2025-47999MEDIUMCVSS 6.82025-07-08
CVE-2025-47999 [MEDIUM] CWE-820 Windows Hyper-V Denial of Service Vulnerability Windows Hyper-V Denial of Service Vulnerability Description: Missing synchronization in Windows Hyper-V allows an authorized attacker to deny service over an adjacent network. FAQ: According to the CVSS metric, the attack vector is adjacent (AV:A). What does that mean for this vulnerability? Successful exploitation of this vulnerability requires that an attacker will need to first gain access to the restricted netw
msrc
CVE-2025-48003MEDIUMCVSS 6.82025-07-08
CVE-2025-48003 [MEDIUM] CWE-693 Windows BitLocker Security Feature Bypass Vulnerability Windows BitLocker Security Feature Bypass Vulnerability Description: Protection mechanism failure in Windows BitLocker allows an unauthorized attacker to bypass a security feature with a physical attack. FAQ: What kind of security feature could be bypassed by successfully exploiting this vulnerability? A successful attacker could bypass the BitLocker Device Encryption feature on the system storage device. A
msrc
CVE-2025-49722MEDIUMCVSS 5.72025-07-08
CVE-2025-49722 [MEDIUM] CWE-400 Windows Print Spooler Denial of Service Vulnerability Windows Print Spooler Denial of Service Vulnerability Description: Uncontrolled resource consumption in Windows Print Spooler Components allows an authorized attacker to deny service over an adjacent network. FAQ: According to the CVSS score, the attack vector is adjacent (AV:A). What does this mean for this vulnerability? This attack is limited to systems connected to the same network segment as the attacker
msrc
CVE-2025-47978MEDIUMCVSS 6.52025-07-08
CVE-2025-47978 [MEDIUM] CWE-125 Windows Kerberos Denial of Service Vulnerability Windows Kerberos Denial of Service Vulnerability Description: Out-of-bounds read in Windows Kerberos allows an authorized attacker to deny service over a network. Windows Kerberos: Windows Kerberos Microsoft: Microsoft Customer Action Required: Yes Impact: Denial of Service Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation More Likely Reference: https://catalog.update.mic
msrc
CVE-2025-47980MEDIUMCVSS 6.22025-07-08
CVE-2025-47980 [MEDIUM] CWE-200 Windows Imaging Component Information Disclosure Vulnerability Windows Imaging Component Information Disclosure Vulnerability Description: Exposure of sensitive information to an unauthorized actor in Windows Imaging Component allows an unauthorized attacker to disclose information locally. FAQ: What type of information could be disclosed by this vulnerability? An attacker who successfully exploited this vulnerability could potentially read small portions of hea
msrc
CVE-2025-48811MEDIUMCVSS 6.72025-07-08
CVE-2025-48811 [MEDIUM] CWE-353 Windows Virtualization-Based Security (VBS) Enclave Elevation of Privilege Vulnerability Windows Virtualization-Based Security (VBS) Enclave Elevation of Privilege Vulnerability Description: Missing support for integrity check in Windows Virtualization-Based Security (VBS) Enclave allows an authorized attacker to elevate privileges locally. FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successf
msrc
CVE-2024-36357MEDIUMCVSS 5.62025-07-08
CVE-2024-36357 [MEDIUM] AMD: CVE-2024-36357 Transient Scheduler Attack in L1 Data Queue AMD: CVE-2024-36357 Transient Scheduler Attack in L1 Data Queue Description: The vulnerability assigned to this CVE is in certain processor models offered by AMD. The mitigation for this vulnerability requires a Windows update. This CVE is being documented in the Security Update Guide to announce that the latest builds of Windows enable the mitigation and provide protection against the vulnerability. Please
msrc
CVE-2025-49760LOWCVSS 3.52025-07-08
CVE-2025-49760 [LOW] CWE-73 Windows Storage Spoofing Vulnerability Windows Storage Spoofing Vulnerability Description: External control of file name or path in Windows Storage allows an authorized attacker to perform spoofing over a network. FAQ: According to the CVSS metric, user interaction is required (UI:R) and privileges required is Low (PR:L). What does that mean for this vulnerability? An authorized attacker with low privileges creates a scheduled task that is set to run when a user log
msrc
CVE-2025-32714HIGHCVSS 7.82025-06-10
CVE-2025-32714 [HIGH] CWE-284 Windows Installer Elevation of Privilege Vulnerability Windows Installer Elevation of Privilege Vulnerability Description: Improper access control in Windows Installer allows an authorized attacker to elevate privileges locally. FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. Windows Installer: Windows Installer Microsoft: Mi
msrc
CVE-2025-32718HIGHCVSS 7.82025-06-10
CVE-2025-32718 [HIGH] CWE-190 Windows SMB Client Elevation of Privilege Vulnerability Windows SMB Client Elevation of Privilege Vulnerability Description: Integer overflow or wraparound in Windows SMB allows an authorized attacker to elevate privileges locally. FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. Windows SMB: Windows SMB Microsoft: Microsoft
msrc
CVE-2025-33071HIGHCVSS 8.12025-06-10
CVE-2025-33071 [HIGH] CWE-416 Windows KDC Proxy Service (KPSSVC) Remote Code Execution Vulnerability Windows KDC Proxy Service (KPSSVC) Remote Code Execution Vulnerability Description: Use after free in Windows KDC Proxy Service (KPSSVC) allows an unauthorized attacker to execute code over a network. FAQ: How could an attacker exploit this vulnerability? An unauthenticated attacker could use a specially crafted application to leverage a cryptographic protocol vulnerability in Kerberos Key Dist
msrc