Msrc Windows Server 2022 23H2 Edition vulnerabilities
1,038 known vulnerabilities affecting msrc/windows_server_2022_23h2_edition.
Total CVEs
1,038
CISA KEV
33
actively exploited
Public exploits
14
Exploited in wild
16
Severity breakdown
CRITICAL12HIGH696MEDIUM326LOW4
Vulnerabilities
Page 19 of 52
CVE-2025-53156MEDIUMCVSS 5.52025-08-12
CVE-2025-53156 [MEDIUM] CWE-200 Windows Storage Port Driver Information Disclosure Vulnerability
Windows Storage Port Driver Information Disclosure Vulnerability
Description: Exposure of sensitive information to an unauthorized actor in Storage Port Driver allows an authorized attacker to disclose information locally.
FAQ: What type of information could be disclosed by this vulnerability?
Exploiting this vulnerability could allow the disclosure of certain kernel memory content.
Storage Port D
msrc
CVE-2025-50172MEDIUMCVSS 6.52025-08-12
CVE-2025-50172 [MEDIUM] CWE-770 DirectX Graphics Kernel Denial of Service Vulnerability
DirectX Graphics Kernel Denial of Service Vulnerability
Description: Allocation of resources without limits or throttling in Windows DirectX allows an authorized attacker to deny service over a network.
Windows DirectX: Windows DirectX
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Denial of Service
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less
msrc
CVE-2025-53153MEDIUMCVSS 5.72025-08-12
CVE-2025-53153 [MEDIUM] CWE-908 Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability
Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability
Description: Use of uninitialized resource in Windows Routing and Remote Access Service (RRAS) allows an authorized attacker to disclose information over a network.
FAQ: According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?
This attack r
msrc
CVE-2025-53148MEDIUMCVSS 5.72025-08-12
CVE-2025-53148 [MEDIUM] CWE-908 Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability
Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability
Description: Use of uninitialized resource in Windows Routing and Remote Access Service (RRAS) allows an authorized attacker to disclose information over a network.
FAQ: How could an attacker exploit this vulnerability?
An attacker authenticated on the domain could exploit this vulnerability b
msrc
CVE-2025-50156MEDIUMCVSS 5.72025-08-12
CVE-2025-50156 [MEDIUM] CWE-908 Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability
Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability
Description: Use of uninitialized resource in Windows Routing and Remote Access Service (RRAS) allows an authorized attacker to disclose information over a network.
FAQ: What type of information could be disclosed by this vulnerability?
An attacker who successfully exploited this vulnerability
msrc
CVE-2025-49751MEDIUMCVSS 6.82025-08-12
CVE-2025-49751 [MEDIUM] CWE-820 Windows Hyper-V Denial of Service Vulnerability
Windows Hyper-V Denial of Service Vulnerability
Description: Missing synchronization in Windows Hyper-V allows an authorized attacker to deny service over an adjacent network.
FAQ: According to the CVSS metric, a successful exploitation could lead to a scope change (S:C). What does this mean for this vulnerability?
In this case, a successful attack could be performed from a low privilege Hyper-V guest. The attacker
msrc
CVE-2025-47981CRITICALCVSS 9.82025-07-08
CVE-2025-47981 [CRITICAL] CWE-122 SPNEGO Extended Negotiation (NEGOEX) Security Mechanism Remote Code Execution Vulnerability
SPNEGO Extended Negotiation (NEGOEX) Security Mechanism Remote Code Execution Vulnerability
Description: Heap-based buffer overflow in Windows SPNEGO Extended Negotiation allows an unauthorized attacker to execute code over a network.
FAQ: How could an attacker exploit the vulnerability?
An attacker could exploit this vulnerability by sending a malicious message to the
msrc
CVE-2025-6965CRITICALCVSS 9.8PoC2025-07-08
CVE-2025-6965 [HIGH] CWE-197 Integer Truncation on SQLite
Integer Truncation on SQLite
FAQ: Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?
One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transp
msrc
CVE-2025-47982HIGHCVSS 7.82025-07-08
CVE-2025-47982 [HIGH] CWE-20 Windows Storage VSP Driver Elevation of Privilege Vulnerability
Windows Storage VSP Driver Elevation of Privilege Vulnerability
Description: Improper input validation in Windows Storage VSP Driver allows an authorized attacker to elevate privileges locally.
FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability?
An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.
Windows Storage VSP Dri
msrc
CVE-2025-48824HIGHCVSS 8.82025-07-08
CVE-2025-48824 [HIGH] CWE-122 Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
Description: Heap-based buffer overflow in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to execute code over a network.
FAQ: How could an attacker exploit this vulnerability?
An attacker could exploit this vulnerability by tricking a user into sending a request
msrc
CVE-2025-49680HIGHCVSS 7.32025-07-08
CVE-2025-49680 [HIGH] CWE-59 Windows Performance Recorder (WPR) Denial of Service Vulnerability
Windows Performance Recorder (WPR) Denial of Service Vulnerability
Description: Improper link resolution before file access ('link following') in Windows Performance Recorder allows an authorized attacker to deny service locally.
FAQ: According to the CVSS metric, user interaction is required (UI:R) and privileges required is Low (PR:L). What does that mean for this vulnerability?
Exploitation of th
msrc
CVE-2025-49740HIGHCVSS 8.82025-07-08
CVE-2025-49740 [HIGH] CWE-693 Windows SmartScreen Security Feature Bypass Vulnerability
Windows SmartScreen Security Feature Bypass Vulnerability
Description: Protection mechanism failure in Windows SmartScreen allows an unauthorized attacker to bypass a security feature over a network.
FAQ: What kind of security feature could be bypassed by successfully exploiting this vulnerability?
An attacker who successfully exploited the vulnerability could evade Mark of the Web (MOTW) defenses.
FAQ: Ho
msrc
CVE-2025-47998HIGHCVSS 8.82025-07-08
CVE-2025-47998 [HIGH] CWE-122 Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
Description: Heap-based buffer overflow in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to execute code over a network.
FAQ: How could an attacker exploit this vulnerability?
An attacker could exploit this vulnerability by tricking a user into sending a request
msrc
CVE-2025-49687HIGHCVSS 8.82025-07-08
CVE-2025-49687 [HIGH] CWE-125 Windows Input Method Editor (IME) Elevation of Privilege Vulnerability
Windows Input Method Editor (IME) Elevation of Privilege Vulnerability
Description: Out-of-bounds read in Microsoft Input Method Editor (IME) allows an authorized attacker to elevate privileges locally.
FAQ: What privileges could be gained by an attacker who successfully exploited the vulnerability?
An attacker could use this vulnerability to elevate privileges from a Low Integrity Level in a c
msrc
CVE-2025-49694HIGHCVSS 7.82025-07-08
CVE-2025-49694 [HIGH] CWE-476 Microsoft Brokering File System Elevation of Privilege Vulnerability
Microsoft Brokering File System Elevation of Privilege Vulnerability
Description: Null pointer dereference in Microsoft Brokering File System allows an authorized attacker to elevate privileges locally.
FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability?
An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.
Microsof
msrc
CVE-2025-49672HIGHCVSS 8.82025-07-08
CVE-2025-49672 [HIGH] CWE-122 Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
Description: Heap-based buffer overflow in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to execute code over a network.
FAQ: According to the CVSS metric, the attack vector is network (AV:N), user interaction is required (UI:R), and privileges required are none
msrc
CVE-2025-49668HIGHCVSS 8.82025-07-08
CVE-2025-49668 [HIGH] CWE-122 Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
Description: Heap-based buffer overflow in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to execute code over a network.
FAQ: According to the CVSS metric, the attack vector is network (AV:N), user interaction is required (UI:R), and privileges required are none
msrc
CVE-2025-49669HIGHCVSS 8.82025-07-08
CVE-2025-49669 [HIGH] CWE-122 Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
Description: Heap-based buffer overflow in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to execute code over a network.
FAQ: According to the CVSS metric, the attack vector is network (AV:N), user interaction is required (UI:R), and privileges required are none
msrc
CVE-2025-49753HIGHCVSS 8.82025-07-08
CVE-2025-49753 [HIGH] CWE-122 Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
Description: Heap-based buffer overflow in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to execute code over a network.
FAQ: According to the CVSS metric, the attack vector is network (AV:N), user interaction is required (UI:R), and privileges required are none
msrc
CVE-2025-49666HIGHCVSS 7.22025-07-08
CVE-2025-49666 [HIGH] CWE-122 Windows Server Setup and Boot Event Collection Remote Code Execution Vulnerability
Windows Server Setup and Boot Event Collection Remote Code Execution Vulnerability
Description: Heap-based buffer overflow in Windows Kernel allows an authorized attacker to execute code over a network.
FAQ: According to the CVSS metric, privileges required is high (PR:H). What does that mean for this vulnerability?
To successfully exploit this vulnerability, an attacker or the targ
msrc