Msrc Windows Server 2022 vulnerabilities
2,339 known vulnerabilities affecting msrc/windows_server_2022.
Total CVEs
2,339
CISA KEV
88
actively exploited
Public exploits
35
Exploited in wild
65
Severity breakdown
CRITICAL52HIGH1626MEDIUM652LOW9
Vulnerabilities
Page 47 of 117
CVE-2024-43450HIGHCVSS 7.52024-11-12
CVE-2024-43450 [HIGH] CWE-924 Windows DNS Spoofing Vulnerability
Windows DNS Spoofing Vulnerability
FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?
The attacker must inject themselves into the logical network path between the target and the resource requested by the victim to read or modify network communications. This is called a machine-in-the-middle (MITM) attack.
FAQ: According to the CVSS metric, user interaction is requ
msrc
CVE-2024-43625HIGHCVSS 8.12024-11-12
CVE-2024-43625 [HIGH] CWE-416 Microsoft Windows VMSwitch Elevation of Privilege Vulnerability
Microsoft Windows VMSwitch Elevation of Privilege Vulnerability
FAQ: According to the CVSS metric, a successful exploitation could lead to a scope change (S:C). What does this mean for this vulnerability?
In this case, a successful attack could be performed from a low privilege Hyper-V guest. The attacker could traverse the guest's security boundary to execute code on the Hyper-V host execution environ
msrc
CVE-2024-43624HIGHCVSS 8.82024-11-12
CVE-2024-43624 [HIGH] CWE-822 Windows Hyper-V Shared Virtual Disk Elevation of Privilege Vulnerability
Windows Hyper-V Shared Virtual Disk Elevation of Privilege Vulnerability
FAQ: How could an attacker exploit this vulnerability?
This vulnerability requires an authenticated attacker on a guest VM to send specially crafted file operation requests on the VM to the hardware resources on the VM.
FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability?
An
msrc
CVE-2024-43636HIGHCVSS 7.82024-11-12
CVE-2024-43636 [HIGH] CWE-822 Win32k Elevation of Privilege Vulnerability
Win32k Elevation of Privilege Vulnerability
FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability?
An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.
Windows DWM Core Library: Windows DWM Core Library
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Elevation of Privilege
Exploit Status: Publicly Disclosed:No;Exploited:No;Lates
msrc
CVE-2024-43452HIGHCVSS 7.52024-11-12
CVE-2024-43452 [HIGH] CWE-367 Windows Registry Elevation of Privilege Vulnerability
Windows Registry Elevation of Privilege Vulnerability
FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability?
An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.
FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?
Successful exploitation of this vulnerability requires a
msrc
CVE-2024-43643MEDIUMCVSS 6.82024-11-12
CVE-2024-43643 [MEDIUM] CWE-125 Windows USB Video Class System Driver Elevation of Privilege Vulnerability
Windows USB Video Class System Driver Elevation of Privilege Vulnerability
FAQ: According to the CVSS metric, the attack vector is physical (AV:P). What does that mean for this vulnerability?
To exploit this vulnerability, an unauthenticated attacker needs to physically connect a malicious USB device to the victim's machine.
FAQ: What privileges could be gained by an attacker who successf
msrc
CVE-2024-43638MEDIUMCVSS 6.82024-11-12
CVE-2024-43638 [MEDIUM] CWE-125 Windows USB Video Class System Driver Elevation of Privilege Vulnerability
Windows USB Video Class System Driver Elevation of Privilege Vulnerability
FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability?
An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.
FAQ: According to the CVSS metric, the attack vector is physical (AV:P). What does that mean for this vulnerability?
To exploit t
msrc
CVE-2024-43631MEDIUMCVSS 6.72024-11-12
CVE-2024-43631 [MEDIUM] CWE-822 Windows Secure Kernel Mode Elevation of Privilege Vulnerability
Windows Secure Kernel Mode Elevation of Privilege Vulnerability
FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability?
An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.
Windows Secure Kernel Mode: Windows Secure Kernel Mode
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Elevation of Privilege
Exploit St
msrc
CVE-2024-38203MEDIUMCVSS 6.22024-11-12
CVE-2024-38203 [MEDIUM] CWE-693 Windows Package Library Manager Information Disclosure Vulnerability
Windows Package Library Manager Information Disclosure Vulnerability
FAQ: What type of information could be disclosed by this vulnerability?
The type of information that could be disclosed if an attacker successfully exploited this vulnerability is secrets or privileged information belonging to the user of the affected application.
Windows Package Library Manager: Windows Package Library Manage
msrc
CVE-2024-43637MEDIUMCVSS 6.82024-11-12
CVE-2024-43637 [MEDIUM] CWE-125 Windows USB Video Class System Driver Elevation of Privilege Vulnerability
Windows USB Video Class System Driver Elevation of Privilege Vulnerability
FAQ: According to the CVSS metric, the attack vector is physical (AV:P). What does that mean for this vulnerability?
To exploit this vulnerability, an unauthenticated attacker needs to physically connect a malicious USB device to the victim's machine.
FAQ: What privileges could be gained by an attacker who successf
msrc
CVE-2024-43451MEDIUMCVSS 6.5KEV2024-11-12
CVE-2024-43451 [MEDIUM] CWE-73 NTLM Hash Disclosure Spoofing Vulnerability
NTLM Hash Disclosure Spoofing Vulnerability
FAQ: According to the CVSS metric, successful exploitation of this vulnerability could lead to total loss of confidentiality (C:H)? What does that mean for this vulnerability?
This vulnerability discloses a user's NTLMv2 hash to the attacker who could use this to authenticate as the user.
FAQ: According to the CVSS metric, user interaction is required (UI:R). What interaction
msrc
CVE-2024-43449MEDIUMCVSS 6.82024-11-12
CVE-2024-43449 [MEDIUM] CWE-125 Windows USB Video Class System Driver Elevation of Privilege Vulnerability
Windows USB Video Class System Driver Elevation of Privilege Vulnerability
FAQ: According to the CVSS metric, the attack vector is physical (AV:P). What does that mean for this vulnerability?
To exploit this vulnerability, an unauthenticated attacker needs to physically connect a malicious USB device to the victim's machine.
FAQ: What privileges could be gained by an attacker who successf
msrc
CVE-2024-43634MEDIUMCVSS 6.82024-11-12
CVE-2024-43634 [MEDIUM] CWE-125 Windows USB Video Class System Driver Elevation of Privilege Vulnerability
Windows USB Video Class System Driver Elevation of Privilege Vulnerability
FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability?
An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.
FAQ: According to the CVSS metric, the attack vector is physical (AV:P). What does that mean for this vulnerability?
To exploit t
msrc
CVE-2024-43646MEDIUMCVSS 6.72024-11-12
CVE-2024-43646 [MEDIUM] CWE-822 Windows Secure Kernel Mode Elevation of Privilege Vulnerability
Windows Secure Kernel Mode Elevation of Privilege Vulnerability
FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability?
An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.
Windows Secure Kernel Mode: Windows Secure Kernel Mode
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Elevation of Privilege
Exploit St
msrc
CVE-2024-38124CRITICALCVSS 9.02024-10-08
CVE-2024-38124 [CRITICAL] CWE-287 Windows Netlogon Elevation of Privilege Vulnerability
Windows Netlogon Elevation of Privilege Vulnerability
FAQ: What privileges could be gained by an attacker who successfully exploited the vulnerability?
An attacker who successfully exploited this vulnerability could gain domain administrator privileges.
FAQ: According to the CVSS metric, the attack vector is adjacent (AV:A). What does that mean for this vulnerability?
An authenticated attacker could exploit
msrc
CVE-2024-43517HIGHCVSS 8.82024-10-08
CVE-2024-43517 [HIGH] CWE-122 Microsoft ActiveX Data Objects Remote Code Execution Vulnerability
Microsoft ActiveX Data Objects Remote Code Execution Vulnerability
FAQ: According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?
An attacker must send the user a malicious file and convince them to open it.
FAQ: According to the CVSS metric, the attack vector is network (AV:N) and the user interaction is required (UI:R). What is the target conte
msrc
CVE-2024-43611HIGHCVSS 8.82024-10-08
CVE-2024-43611 [HIGH] CWE-20 Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
FAQ: How could an attacker exploit this vulnerability?
An attacker who successfully exploited this vulnerability could gain remote code execution (RCE) on the victim's machine.
FAQ: How could an attacker exploit this vulnerability?
An unauthenticated attacker could send a specially crafted protocol
msrc
CVE-2024-38265HIGHCVSS 8.82024-10-08
CVE-2024-38265 [HIGH] CWE-20 Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
FAQ: According to the CVSS metric, the attack vector is network (AV:N) and the user interaction is required (UI:R). What is the target context of the remote code execution?
This attack requires an admin user on the client to connect to a malicious server, and that could allow the attacker to gain co
msrc
CVE-2024-43581HIGHCVSS 7.12024-10-08
CVE-2024-43581 [HIGH] CWE-73 Microsoft OpenSSH for Windows Remote Code Execution Vulnerability
Microsoft OpenSSH for Windows Remote Code Execution Vulnerability
FAQ: According to the CVSS metric, privileges required is low (PR:L). What does that mean for this vulnerability?
Successful exploitation of this vulnerability requires an attacker to have access to the location where the target file will be run. They would then need to plant a specific file that would be used as part of the exploitatio
msrc
CVE-2024-43574HIGHCVSS 8.32024-10-08
CVE-2024-43574 [HIGH] CWE-416 Microsoft Speech Application Programming Interface (SAPI) Remote Code Execution Vulnerability
Microsoft Speech Application Programming Interface (SAPI) Remote Code Execution Vulnerability
FAQ: How could an attacker exploit this vulnerability?
An attacker could exploit a use after free vulnerability within the OS SAPI component to execute arbitrary code in the context of the compromised user to disclose sensitive information, compromise system integrity or impact th
msrc