Msrc Windows Server 2022 23H2 Edition vulnerabilities

1,038 known vulnerabilities affecting msrc/windows_server_2022_23h2_edition.

Total CVEs
1,038
CISA KEV
33
actively exploited
Public exploits
14
Exploited in wild
16
Severity breakdown
CRITICAL12HIGH696MEDIUM326LOW4

Vulnerabilities

Page 11 of 52
CVE-2025-60720HIGHCVSS 7.82025-11-11
CVE-2025-60720 [HIGH] CWE-126 Windows Transport Driver Interface (TDI) Translation Driver Elevation of Privilege Vulnerability Windows Transport Driver Interface (TDI) Translation Driver Elevation of Privilege Vulnerability Description: Buffer over-read in Windows TDX.sys allows an authorized attacker to elevate privileges locally. FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could g
msrc
CVE-2025-59508HIGHCVSS 7.02025-11-11
CVE-2025-59508 [HIGH] CWE-362 Windows Speech Recognition Elevation of Privilege Vulnerability Windows Speech Recognition Elevation of Privilege Vulnerability Description: Concurrent execution using shared resource with improper synchronization ('race condition') in Windows Speech allows an authorized attacker to elevate privileges locally. FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability
msrc
CVE-2025-59507HIGHCVSS 7.02025-11-11
CVE-2025-59507 [HIGH] CWE-362 Windows Speech Runtime Elevation of Privilege Vulnerability Windows Speech Runtime Elevation of Privilege Vulnerability Description: Concurrent execution using shared resource with improper synchronization ('race condition') in Windows Speech allows an authorized attacker to elevate privileges locally. FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability? Successful exploitation of this vulnerability r
msrc
CVE-2025-59509MEDIUMCVSS 5.52025-11-11
CVE-2025-59509 [MEDIUM] CWE-201 Windows Speech Recognition Information Disclosure Vulnerability Windows Speech Recognition Information Disclosure Vulnerability Description: Insertion of sensitive information into sent data in Windows Speech allows an authorized attacker to disclose information locally. FAQ: What type of information could be disclosed by this vulnerability? The type of information that could be disclosed if an attacker successfully exploited this vulnerability is internal memor
msrc
CVE-2025-60723MEDIUMCVSS 6.32025-11-11
CVE-2025-60723 [MEDIUM] CWE-362 DirectX Graphics Kernel Denial of Service Vulnerability DirectX Graphics Kernel Denial of Service Vulnerability Description: Concurrent execution using shared resource with improper synchronization ('race condition') in Windows DirectX allows an authorized attacker to deny service over a network. FAQ: According to the CVSS metric, a successful exploitation could lead to a scope change (S:C). What does this mean for this vulnerability? In this case, a successful
msrc
CVE-2025-60708MEDIUMCVSS 6.52025-11-11
CVE-2025-60708 [MEDIUM] CWE-822 Storvsp.sys Driver Denial of Service Vulnerability Storvsp.sys Driver Denial of Service Vulnerability Description: Untrusted pointer dereference in Storvsp.sys Driver allows an authorized attacker to deny service locally. FAQ: According to the CVSS metric, a successful exploitation could lead to a scope change (S:C). What does this mean for this vulnerability? In this case, a successful attack could be performed from a low privilege Hyper-V guest. The attacker c
msrc
CVE-2025-59510MEDIUMCVSS 5.52025-11-11
CVE-2025-59510 [MEDIUM] CWE-59 Windows Routing and Remote Access Service (RRAS) Denial of Service Vulnerability Windows Routing and Remote Access Service (RRAS) Denial of Service Vulnerability Description: Improper link resolution before file access ('link following') in Windows Routing and Remote Access Service (RRAS) allows an authorized attacker to deny service locally. Windows Routing and Remote Access Service (RRAS): Windows Routing and Remote Access Service (RRAS) Microsoft: Microsoft
msrc
CVE-2025-60706MEDIUMCVSS 5.52025-11-11
CVE-2025-60706 [MEDIUM] CWE-125 Windows Hyper-V Information Disclosure Vulnerability Windows Hyper-V Information Disclosure Vulnerability Description: Out-of-bounds read in Windows Hyper-V allows an authorized attacker to disclose information locally. FAQ: What type of information could be disclosed by this vulnerability? An attacker who successfully exploited this vulnerability could potentially read small portions of heap memory. Role: Windows Hyper-V: Role: Windows Hyper-V Microsoft: Micr
msrc
CVE-2025-59513MEDIUMCVSS 5.52025-11-11
CVE-2025-59513 [MEDIUM] CWE-125 Windows Bluetooth RFCOM Protocol Driver Information Disclosure Vulnerability Windows Bluetooth RFCOM Protocol Driver Information Disclosure Vulnerability Description: Out-of-bounds read in Windows Bluetooth RFCOM Protocol Driver allows an authorized attacker to disclose information locally. FAQ: According to the CVSS metrics, successful exploitation of this vulnerability could lead to major loss of confidentiality (C:H), no loss of integrity (I:N), and some loss
msrc
CVE-2025-62208MEDIUMCVSS 5.52025-11-11
CVE-2025-62208 [MEDIUM] CWE-532 Windows License Manager Information Disclosure Vulnerability Windows License Manager Information Disclosure Vulnerability Description: Insertion of sensitive information into log file in Windows License Manager allows an authorized attacker to disclose information locally. FAQ: What type of information could be disclosed by this vulnerability? The type of information that could be disclosed if an attacker successfully exploited this vulnerability is the local me
msrc
CVE-2025-62209MEDIUMCVSS 5.52025-11-11
CVE-2025-62209 [MEDIUM] CWE-532 Windows License Manager Information Disclosure Vulnerability Windows License Manager Information Disclosure Vulnerability Description: Insertion of sensitive information into log file in Windows License Manager allows an authorized attacker to disclose information locally. FAQ: What type of information could be disclosed by this vulnerability? The type of information that could be disclosed if an attacker successfully exploited this vulnerability is the local me
msrc
CVE-2025-49708CRITICALCVSS 9.92025-10-14
CVE-2025-49708 [CRITICAL] CWE-416 Microsoft Graphics Component Elevation of Privilege Vulnerability Microsoft Graphics Component Elevation of Privilege Vulnerability Description: Use after free in Microsoft Graphics Component allows an authorized attacker to elevate privileges over a network. FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. FAQ: How could a
msrc
CVE-2025-59287CRITICALCVSS 9.8KEVPoC2025-10-14
CVE-2025-59287 [CRITICAL] CWE-502 Windows Server Update Service (WSUS) Remote Code Execution Vulnerability Windows Server Update Service (WSUS) Remote Code Execution Vulnerability Description: Deserialization of untrusted data in Windows Server Update Service allows an unauthorized attacker to execute code over a network. FAQ: How could an attacker exploit this vulnerability? A remote, unauthenticated attacker could send a crafted event that triggers unsafe object deserialization in a legacy s
msrc
CVE-2025-48004HIGHCVSS 7.42025-10-14
CVE-2025-48004 [HIGH] CWE-416 Microsoft Brokering File System Elevation of Privilege Vulnerability Microsoft Brokering File System Elevation of Privilege Vulnerability Description: Use after free in Microsoft Brokering File System allows an unauthorized attacker to elevate privileges locally. FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability? Successful exploitation of this vulnerability requires an attacker to win a race condit
msrc
CVE-2025-55697HIGHCVSS 7.82025-10-14
CVE-2025-55697 [HIGH] CWE-122 Azure Local Elevation of Privilege Vulnerability Azure Local Elevation of Privilege Vulnerability Description: Heap-based buffer overflow in Azure Local allows an authorized attacker to elevate privileges locally. FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. Azure Local: Azure Local Microsoft: Microsoft Customer Action Re
msrc
CVE-2025-55339HIGHCVSS 7.82025-10-14
CVE-2025-55339 [HIGH] CWE-125 Windows Network Driver Interface Specification (NDIS) Driver Elevation of Privilege Vulnerability Windows Network Driver Interface Specification (NDIS) Driver Elevation of Privilege Vulnerability Description: Out-of-bounds read in Windows NDIS allows an authorized attacker to elevate privileges locally. FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could
msrc
CVE-2025-55687HIGHCVSS 7.42025-10-14
CVE-2025-55687 [HIGH] CWE-362 Windows Resilient File System (ReFS) Elevation of Privilege Vulnerability Windows Resilient File System (ReFS) Elevation of Privilege Vulnerability Description: Concurrent execution using shared resource with improper synchronization ('race condition') in Windows Resilient File System (ReFS) allows an unauthorized attacker to elevate privileges locally. FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerabil
msrc
CVE-2025-59193HIGHCVSS 7.02025-10-14
CVE-2025-59193 [HIGH] CWE-362 Windows Management Services Elevation of Privilege Vulnerability Windows Management Services Elevation of Privilege Vulnerability Description: Concurrent execution using shared resource with improper synchronization ('race condition') in Windows Management Services allows an authorized attacker to elevate privileges locally. FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability? Successful exploitation
msrc
CVE-2025-55680HIGHCVSS 7.82025-10-14
CVE-2025-55680 [HIGH] CWE-367 Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability Description: Time-of-check time-of-use (toctou) race condition in Windows Cloud Files Mini Filter Driver allows an authorized attacker to elevate privileges locally. FAQ: What privileges could be gained by an attacker who successfully exploited the vulnerability? A domain user could use this vulnerability to elevat
msrc
CVE-2025-55681HIGHCVSS 7.02025-10-14
CVE-2025-55681 [HIGH] CWE-125 Desktop Window Manager Elevation of Privilege Vulnerability Desktop Window Manager Elevation of Privilege Vulnerability Description: Out-of-bounds read in Windows DWM allows an authorized attacker to elevate privileges locally. FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability? Successful exploitation of this vulnerability requires an attacker to manipulate system operations in a specific manner. F
msrc