Msrc Windows Server 2022 vulnerabilities
2,339 known vulnerabilities affecting msrc/windows_server_2022.
Total CVEs
2,339
CISA KEV
88
actively exploited
Public exploits
35
Exploited in wild
65
Severity breakdown
CRITICAL52HIGH1626MEDIUM652LOW9
Vulnerabilities
Page 49 of 117
CVE-2024-43560HIGHCVSS 7.82024-10-08
CVE-2024-43560 [HIGH] CWE-122 Microsoft Windows Storage Port Driver Elevation of Privilege Vulnerability
Microsoft Windows Storage Port Driver Elevation of Privilege Vulnerability
FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability?
An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.
Windows Storage Port Driver: Windows Storage Port Driver
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Elevation of
msrc
CVE-2024-43562HIGHCVSS 7.52024-10-08
CVE-2024-43562 [HIGH] CWE-125 Windows Network Address Translation (NAT) Denial of Service Vulnerability
Windows Network Address Translation (NAT) Denial of Service Vulnerability
Windows Network Address Translation (NAT): Windows Network Address Translation (NAT)
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Denial of Service
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely
Reference: https://catalog.update.microsoft.com/v7/sit
msrc
CVE-2024-43583HIGHCVSS 7.82024-10-08
CVE-2024-43583 [HIGH] CWE-250 Winlogon Elevation of Privilege Vulnerability
Winlogon Elevation of Privilege Vulnerability
FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability?
An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.
FAQ: Are there any further actions I need to take to be protected from this vulnerability?
Yes. To address this vulnerability, ensure that a Microsoft first-party Input Method Editor (IME)
msrc
CVE-2024-43514HIGHCVSS 7.82024-10-08
CVE-2024-43514 [HIGH] CWE-415 Windows Resilient File System (ReFS) Elevation of Privilege Vulnerability
Windows Resilient File System (ReFS) Elevation of Privilege Vulnerability
FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability?
An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.
Windows NTFS: Windows NTFS
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Elevation of Privilege
Exploit Status: Publ
msrc
CVE-2024-43572HIGHCVSS 7.8KEV2024-10-08
CVE-2024-43572 [HIGH] CWE-707 Microsoft Management Console Remote Code Execution Vulnerability
Microsoft Management Console Remote Code Execution Vulnerability
FAQ: What does the security update provide to mitigate the risks associated with this vulnerability?
The security update will prevent untrusted Microsoft Saved Console (MSC) files from being opened to protect customers against the risks associated with this vulnerability.
FAQ: According to the CVSS metric, the attack vector is local (AV
msrc
CVE-2024-38149HIGHCVSS 7.52024-10-08
CVE-2024-38149 [HIGH] CWE-400 BranchCache Denial of Service Vulnerability
BranchCache Denial of Service Vulnerability
BranchCache: BranchCache
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Denial of Service
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely
Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5044277
Reference: https://support.microsoft.com/help/5044277
Reference: https://catalog.update.micr
msrc
CVE-2024-43608HIGHCVSS 8.82024-10-08
CVE-2024-43608 [HIGH] CWE-122 Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
FAQ: According to the CVSS metric, the attack vector is network (AV:N) and the user interaction is required (UI:R). What is the target context of the remote code execution?
This attack requires an admin user on the client to connect to a malicious server, and that could allow the attacker to gain c
msrc
CVE-2024-43544HIGHCVSS 7.52024-10-08
CVE-2024-43544 [HIGH] CWE-400 Microsoft Simple Certificate Enrollment Protocol Denial of Service Vulnerability
Microsoft Simple Certificate Enrollment Protocol Denial of Service Vulnerability
Microsoft Simple Certificate Enrollment Protocol: Microsoft Simple Certificate Enrollment Protocol
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Denial of Service
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely
Reference: https://catalog
msrc
CVE-2024-20659HIGHCVSS 7.12024-10-08
CVE-2024-20659 [HIGH] CWE-20 Windows Hyper-V Security Feature Bypass Vulnerability
Windows Hyper-V Security Feature Bypass Vulnerability
FAQ: According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?
Successful exploitation of this vulnerability by an attacker requires a user to first reboot their machine.
FAQ: What kind of security feature could be bypassed by successfully exploiting this vulnerability?
This Hypervisor vulnerability relates
msrc
CVE-2024-43533HIGHCVSS 8.82024-10-08
CVE-2024-43533 [HIGH] CWE-416 Remote Desktop Client Remote Code Execution Vulnerability
Remote Desktop Client Remote Code Execution Vulnerability
FAQ: How could an attacker exploit this vulnerability?
In the case of a Remote Desktop connection, an attacker with control of a Remote Desktop Server could trigger a remote code execution (RCE) on the RDP client machine when a victim connects to the attacking server with the vulnerable Remote Desktop Client.
Remote Desktop Client: Remote Desktop Cli
msrc
CVE-2024-43563HIGHCVSS 7.82024-10-08
CVE-2024-43563 [HIGH] CWE-591 Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability?
An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.
Windows Ancillary Function Driver for WinSock: Windows Ancillary Function Driver for WinSock
Microsoft: Microsoft
msrc
CVE-2024-43532HIGHCVSS 8.82024-10-08
CVE-2024-43532 [HIGH] CWE-636 Remote Registry Service Elevation of Privilege Vulnerability
Remote Registry Service Elevation of Privilege Vulnerability
FAQ: How could an attacker exploit the vulnerability?
To exploit this vulnerability, an attacker could execute a specially crafted malicious script which executes an RPC call to an RPC host. This could result in elevation of privilege on the server.
FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerabilit
msrc
CVE-2024-43592HIGHCVSS 8.82024-10-08
CVE-2024-43592 [HIGH] CWE-20 Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
FAQ: According to the CVSS metric, the attack vector is network (AV:N) and the user interaction is required (UI:R). What is the target context of the remote code execution?
This attack requires an admin user on the client to connect to a malicious server, and that could allow the attacker to gain co
msrc
CVE-2024-43545HIGHCVSS 7.52024-10-08
CVE-2024-43545 [HIGH] CWE-400 Windows Online Certificate Status Protocol (OCSP) Server Denial of Service Vulnerability
Windows Online Certificate Status Protocol (OCSP) Server Denial of Service Vulnerability
Windows Online Certificate Status Protocol (OCSP): Windows Online Certificate Status Protocol (OCSP)
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Denial of Service
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely
Referenc
msrc
CVE-2024-43556HIGHCVSS 7.82024-10-08
CVE-2024-43556 [HIGH] CWE-416 Windows Graphics Component Elevation of Privilege Vulnerability
Windows Graphics Component Elevation of Privilege Vulnerability
FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability?
An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.
Microsoft Graphics Component: Microsoft Graphics Component
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Elevation of Privilege
Exploit
msrc
CVE-2024-43575HIGHCVSS 7.52024-10-08
CVE-2024-43575 [HIGH] CWE-400 Windows Hyper-V Denial of Service Vulnerability
Windows Hyper-V Denial of Service Vulnerability
Role: Windows Hyper-V: Role: Windows Hyper-V
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Denial of Service
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely
Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5044277
Reference: https://support.microsoft.com/help/5044277
Reference:
msrc
CVE-2024-43549HIGHCVSS 8.82024-10-08
CVE-2024-43549 [HIGH] CWE-121 Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
FAQ: How could an attacker exploit this vulnerability?
An attacker could exploit this vulnerability by tricking a user into sending a request to a malicious server. This could result in the server returning malicious data that might cause arbitrary code execution on the user's system.
FAQ: Accordi
msrc
CVE-2024-43567HIGHCVSS 7.52024-10-08
CVE-2024-43567 [HIGH] CWE-770 Windows Hyper-V Denial of Service Vulnerability
Windows Hyper-V Denial of Service Vulnerability
Role: Windows Hyper-V: Role: Windows Hyper-V
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Denial of Service
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely
Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5044277
Reference: https://support.microsoft.com/help/5044277
Reference:
msrc
CVE-2024-43501HIGHCVSS 7.82024-10-08
CVE-2024-43501 [HIGH] CWE-59 Windows Common Log File System Driver Elevation of Privilege Vulnerability
Windows Common Log File System Driver Elevation of Privilege Vulnerability
FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability?
An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.
Windows Common Log File System Driver: Windows Common Log File System Driver
Microsoft: Microsoft
Customer Action Required: Yes
I
msrc
CVE-2024-6197HIGHCVSS 8.82024-10-08
CVE-2024-6197 [HIGH] CWE-590 Hackerone: CVE-2024-6197 Freeing stack buffer in utf8asn1str
Hackerone: CVE-2024-6197 Freeing stack buffer in utf8asn1str
NIST NVD Details: https://nvd.nist.gov/vuln/detail/CVE-2024-6197
FAQ: According to the CVSS metric, the attack vector is network (AV:N) and the user interaction is required (UI:R). What is the target context of the remote code execution?
This attack requires a client to connect to a malicious server, and that could allow the attacker to gain cod
msrc