Msrc Windows Server 2022 vulnerabilities
2,339 known vulnerabilities affecting msrc/windows_server_2022.
Total CVEs
2,339
CISA KEV
88
actively exploited
Public exploits
38
Exploited in wild
65
Severity breakdown
CRITICAL52HIGH1626MEDIUM652LOW9
Vulnerabilities
Page 93 of 117
CVE-2023-28256MEDIUMCVSS 6.62023-04-11
CVE-2023-28256 [MEDIUM] CWE-591 Windows DNS Server Remote Code Execution Vulnerability
Windows DNS Server Remote Code Execution Vulnerability
FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?
Successful exploitation of this vulnerability requires an attacker to win a race condition.
FAQ: According to the CVSS metric, privileges required is high (PR:H). What does that mean for this vulnerability?
Successful exploitation of this
msrc
CVE-2023-28266MEDIUMCVSS 5.52023-04-11
CVE-2023-28266 [MEDIUM] CWE-126 Windows Common Log File System Driver Information Disclosure Vulnerability
Windows Common Log File System Driver Information Disclosure Vulnerability
FAQ: What type of information could be disclosed by this vulnerability?
An attacker who successfully exploited this vulnerability could potentially read small portions of heap memory.
Windows Common Log File System Driver: Windows Common Log File System Driver
Microsoft: Microsoft
Customer Action Required: Yes
I
msrc
CVE-2023-28223MEDIUMCVSS 6.62023-04-11
CVE-2023-28223 [MEDIUM] CWE-416 Windows Domain Name Service Remote Code Execution Vulnerability
Windows Domain Name Service Remote Code Execution Vulnerability
FAQ: How could an attacker exploit this vulnerability?
In a network-based attack an attacker would need to have the privileges to query the Domain Name Service (DNS). If the timing of DNS queries is perfect, the attacker could execute code remotely on the target server.
Microsoft Windows DNS: Microsoft Windows DNS
Microsoft: Microsoft
msrc
CVE-2023-28306MEDIUMCVSS 6.62023-04-11
CVE-2023-28306 [MEDIUM] CWE-416 Windows DNS Server Remote Code Execution Vulnerability
Windows DNS Server Remote Code Execution Vulnerability
FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?
Successful exploitation of this vulnerability requires an attacker to win a race condition.
FAQ: According to the CVSS metric, privileges required is high (PR:H). What does that mean for this vulnerability?
Successful exploitation of this
msrc
CVE-2021-45985MEDIUMCVSS 5.52023-04-11
CVE-2021-45985 [HIGH] CWE-1395 Mitre: CVE-2021-45985 Erroneous finalizer call in Lua leads to a heap-based buffer over-read
Mitre: CVE-2021-45985 Erroneous finalizer call in Lua leads to a heap-based buffer over-read
NIST NVD Details: https://nvd.nist.gov/vuln/detail/CVE-2021-45985
Description: This CVE was assigned by Mitre. Some Microsoft products consume Lau open-source software. The purpose of this document is to attest to the fact that the products listed in the Security Updates table hav
msrc
CVE-2023-28249MEDIUMCVSS 6.22023-04-11
CVE-2023-28249 [MEDIUM] Windows Boot Manager Security Feature Bypass Vulnerability
Windows Boot Manager Security Feature Bypass Vulnerability
FAQ: What kind of security feature could be bypassed by successfully exploiting this vulnerability?
An attacker who successfully exploited this vulnerability could bypass Secure Boot to run unauthorized code. To be successful the attacker would need either physical access or administrator privileges.
Windows Boot Manager: Windows Boot Manager
Microsoft:
msrc
CVE-2023-28308MEDIUMCVSS 6.62023-04-11
CVE-2023-28308 [MEDIUM] CWE-416 Windows DNS Server Remote Code Execution Vulnerability
Windows DNS Server Remote Code Execution Vulnerability
FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?
Successful exploitation of this vulnerability requires an attacker to win a race condition.
FAQ: According to the CVSS metric, privileges required is high (PR:H). What does that mean for this vulnerability?
Successful exploitation of this
msrc
CVE-2023-28270MEDIUMCVSS 6.82023-04-11
CVE-2023-28270 [MEDIUM] Windows Lock Screen Security Feature Bypass Vulnerability
Windows Lock Screen Security Feature Bypass Vulnerability
FAQ: What kind of security feature could be bypassed by successfully exploiting this vulnerability?
The authentication feature could be bypassed as this vulnerability allows impersonation.
Windows Lock Screen: Windows Lock Screen
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Security Feature Bypass
Exploit Status: Publicly Disclosed:No;Exp
msrc
CVE-2023-28228MEDIUMCVSS 5.52023-04-11
CVE-2023-28228 [MEDIUM] CWE-347 Windows Spoofing Vulnerability
Windows Spoofing Vulnerability
FAQ: How could an attacker successfully exploit this vulnerability?
An attacker could convince a user on the target device to open a maliciously crafted HTA file designed to appear as a legitimately signed WIM file (Windows Imaging Format).
Windows RDP Client: Windows RDP Client
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Spoofing
Exploit Status: Publicly Disclosed:No;Exploited:No;L
msrc
CVE-2023-28267MEDIUMCVSS 6.52023-04-11
CVE-2023-28267 [MEDIUM] CWE-126 Remote Desktop Protocol Client Information Disclosure Vulnerability
Remote Desktop Protocol Client Information Disclosure Vulnerability
FAQ: What type of information could be disclosed by this vulnerability?
An attacker who successfully exploited this vulnerability could potentially read small portions of heap memory.
FAQ: According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?
This vulnerability could be tr
msrc
CVE-2023-28276MEDIUMCVSS 4.42023-04-11
CVE-2023-28276 [MEDIUM] Windows Group Policy Security Feature Bypass Vulnerability
Windows Group Policy Security Feature Bypass Vulnerability
FAQ: What kind of security feature could be bypassed by successfully exploiting this vulnerability?
The vulnerability would only prevent an admin from updating group policies during the time an attacker is performing a specific action; however, it would not prevent an admin from otherwise being able to update the policies.
Windows Group Policy: Windows G
msrc
CVE-2023-23392CRITICALCVSS 9.82023-03-14
CVE-2023-23392 [CRITICAL] CWE-416 HTTP Protocol Stack Remote Code Execution Vulnerability
HTTP Protocol Stack Remote Code Execution Vulnerability
FAQ: How could an attacker exploit this vulnerability?
In most situations, an unauthenticated attacker could send a specially crafted packet to a targeted server utilizing the HTTP Protocol Stack (http.sys) to process packets.
Windows HTTP Protocol Stack: Windows HTTP Protocol Stack
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Remote
msrc
CVE-2023-21708CRITICALCVSS 9.82023-03-14
CVE-2023-21708 [CRITICAL] CWE-191 Remote Procedure Call Runtime Remote Code Execution Vulnerability
Remote Procedure Call Runtime Remote Code Execution Vulnerability
FAQ: How could an attacker exploit this vulnerability?
To exploit this vulnerability, an unauthenticated attacker would need to send a specially crafted RPC call to an RPC host. This could result in remote code execution on the server side with the same permissions as the RPC service.
FAQ: Is blocking RPC with a perimeter firewall
msrc
CVE-2023-23415CRITICALCVSS 9.82023-03-14
CVE-2023-23415 [CRITICAL] CWE-122 Internet Control Message Protocol (ICMP) Remote Code Execution Vulnerability
Internet Control Message Protocol (ICMP) Remote Code Execution Vulnerability
FAQ: How could an attacker exploit this vulnerability?
An attacker could send a low-level protocol error containing a fragmented IP packet inside another ICMP packet in its header to the target machine. To trigger the vulnerable code path, an application on the target must be bound to a raw socket.
Internet C
msrc
CVE-2023-23417HIGHCVSS 7.82023-03-14
CVE-2023-23417 [HIGH] CWE-190 Windows Partition Management Driver Elevation of Privilege Vulnerability
Windows Partition Management Driver Elevation of Privilege Vulnerability
FAQ: What privileges could be gained by an attacker who successfully exploited the vulnerability?
An attacker who successfully exploited this vulnerability could gain specific limited SYSTEM privileges.
Windows Partition Management Driver: Windows Partition Management Driver
Microsoft: Microsoft
Customer Action Require
msrc
CVE-2023-23400HIGHCVSS 7.22023-03-14
CVE-2023-23400 [HIGH] CWE-122 Windows DNS Server Remote Code Execution Vulnerability
Windows DNS Server Remote Code Execution Vulnerability
FAQ: According to the CVSS metric, privileges required is high (PR:H). What does that mean for this vulnerability?
Successful exploitation of this vulnerability requires the attacker or targeted user to have specific elevated privileges. As is best practice, regular validation and audits of administrative groups should be conducted.
Role: DNS Server: Role:
msrc
CVE-2023-23404HIGHCVSS 8.12023-03-14
CVE-2023-23404 [HIGH] CWE-416 Windows Point-to-Point Tunneling Protocol Remote Code Execution Vulnerability
Windows Point-to-Point Tunneling Protocol Remote Code Execution Vulnerability
FAQ: How could an attacker exploit this vulnerability?
An unauthenticated attacker could send a specially crafted protocol message to a Routing and Remote Access Service (RRAS) server, which could lead to remote code execution (RCE) on the RAS server machine.
FAQ: According to the CVSS metric, the attack comple
msrc
CVE-2023-23414HIGHCVSS 7.12023-03-14
CVE-2023-23414 [HIGH] CWE-591 Windows Point-to-Point Protocol over Ethernet (PPPoE) Remote Code Execution Vulnerability
Windows Point-to-Point Protocol over Ethernet (PPPoE) Remote Code Execution Vulnerability
FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?
Successful exploitation of this vulnerability requires an attacker to win a race condition.
FAQ: According to the CVSS score, the attack vector is adjacent (AV:A). What do
msrc
CVE-2023-23403HIGHCVSS 8.82023-03-14
CVE-2023-23403 [HIGH] CWE-122 Microsoft PostScript and PCL6 Class Printer Driver Remote Code Execution Vulnerability
Microsoft PostScript and PCL6 Class Printer Driver Remote Code Execution Vulnerability
FAQ: How could an attacker exploit this vulnerability?
An authenticated attacker with normal privileges could send a modified XPS file to a shared printer, which can result in a remote code execution.
Microsoft Printer Drivers: Microsoft Printer Drivers
Microsoft: Microsoft
Customer Action R
msrc
CVE-2023-23413HIGHCVSS 8.82023-03-14
CVE-2023-23413 [HIGH] CWE-908 Microsoft PostScript and PCL6 Class Printer Driver Remote Code Execution Vulnerability
Microsoft PostScript and PCL6 Class Printer Driver Remote Code Execution Vulnerability
FAQ: How could an attacker exploit this vulnerability?
An authenticated attacker with normal privileges could send a modified XPS file to a shared printer, which can result in a remote code execution.
Microsoft PostScript Printer Driver: Microsoft PostScript Printer Driver
Microsoft: Microsof
msrc