Msrc Windows Server 2022 23H2 Edition vulnerabilities
1,038 known vulnerabilities affecting msrc/windows_server_2022_23h2_edition.
Total CVEs
1,038
CISA KEV
33
actively exploited
Public exploits
14
Exploited in wild
16
Severity breakdown
CRITICAL12HIGH696MEDIUM326LOW4
Vulnerabilities
Page 22 of 52
CVE-2025-48804MEDIUMCVSS 6.82025-07-08
CVE-2025-48804 [MEDIUM] CWE-349 Windows BitLocker Security Feature Bypass Vulnerability
Windows BitLocker Security Feature Bypass Vulnerability
Description: Acceptance of extraneous untrusted data with trusted data in Windows BitLocker allows an unauthorized attacker to bypass a security feature with a physical attack.
FAQ: What kind of security feature could be bypassed by successfully exploiting this vulnerability?
A successful attacker could bypass the BitLocker Device Encryption feature on
msrc
CVE-2025-48818MEDIUMCVSS 6.82025-07-08
CVE-2025-48818 [MEDIUM] CWE-367 Windows BitLocker Security Feature Bypass Vulnerability
Windows BitLocker Security Feature Bypass Vulnerability
Description: Time-of-check time-of-use (toctou) race condition in Windows BitLocker allows an unauthorized attacker to bypass a security feature with a physical attack.
FAQ: What kind of security feature could be bypassed by successfully exploiting this vulnerability?
A successful attacker could bypass the BitLocker Device Encryption feature on the sys
msrc
CVE-2025-48800MEDIUMCVSS 6.82025-07-08
CVE-2025-48800 [MEDIUM] CWE-693 Windows BitLocker Security Feature Bypass Vulnerability
Windows BitLocker Security Feature Bypass Vulnerability
Description: Protection mechanism failure in Windows BitLocker allows an unauthorized attacker to bypass a security feature with a physical attack.
FAQ: What kind of security feature could be bypassed by successfully exploiting this vulnerability?
A successful attacker could bypass the BitLocker Device Encryption feature on the system storage device. A
msrc
CVE-2025-48823MEDIUMCVSS 5.92025-07-08
CVE-2025-48823 [MEDIUM] CWE-310 Windows Cryptographic Services Information Disclosure Vulnerability
Windows Cryptographic Services Information Disclosure Vulnerability
Description: Cryptographic issues in Windows Cryptographic Services allows an unauthorized attacker to disclose information over a network.
FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability
To exploit this vulnerability, an attacker would need to target an applica
msrc
CVE-2025-47999MEDIUMCVSS 6.82025-07-08
CVE-2025-47999 [MEDIUM] CWE-820 Windows Hyper-V Denial of Service Vulnerability
Windows Hyper-V Denial of Service Vulnerability
Description: Missing synchronization in Windows Hyper-V allows an authorized attacker to deny service over an adjacent network.
FAQ: According to the CVSS metric, the attack vector is adjacent (AV:A). What does that mean for this vulnerability?
Successful exploitation of this vulnerability requires that an attacker will need to first gain access to the restricted netw
msrc
CVE-2025-48003MEDIUMCVSS 6.82025-07-08
CVE-2025-48003 [MEDIUM] CWE-693 Windows BitLocker Security Feature Bypass Vulnerability
Windows BitLocker Security Feature Bypass Vulnerability
Description: Protection mechanism failure in Windows BitLocker allows an unauthorized attacker to bypass a security feature with a physical attack.
FAQ: What kind of security feature could be bypassed by successfully exploiting this vulnerability?
A successful attacker could bypass the BitLocker Device Encryption feature on the system storage device. A
msrc
CVE-2025-47978MEDIUMCVSS 6.52025-07-08
CVE-2025-47978 [MEDIUM] CWE-125 Windows Kerberos Denial of Service Vulnerability
Windows Kerberos Denial of Service Vulnerability
Description: Out-of-bounds read in Windows Kerberos allows an authorized attacker to deny service over a network.
Windows Kerberos: Windows Kerberos
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Denial of Service
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation More Likely
Reference: https://catalog.update.mic
msrc
CVE-2025-48811MEDIUMCVSS 6.72025-07-08
CVE-2025-48811 [MEDIUM] CWE-353 Windows Virtualization-Based Security (VBS) Enclave Elevation of Privilege Vulnerability
Windows Virtualization-Based Security (VBS) Enclave Elevation of Privilege Vulnerability
Description: Missing support for integrity check in Windows Virtualization-Based Security (VBS) Enclave allows an authorized attacker to elevate privileges locally.
FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability?
An attacker who successf
msrc
CVE-2024-36357MEDIUMCVSS 5.62025-07-08
CVE-2024-36357 [MEDIUM] AMD: CVE-2024-36357 Transient Scheduler Attack in L1 Data Queue
AMD: CVE-2024-36357 Transient Scheduler Attack in L1 Data Queue
Description: The vulnerability assigned to this CVE is in certain processor models offered by AMD. The mitigation for this vulnerability requires a Windows update. This CVE is being documented in the Security Update Guide to announce that the latest builds of Windows enable the mitigation and provide protection against the vulnerability.
Please
msrc
CVE-2025-49760LOWCVSS 3.52025-07-08
CVE-2025-49760 [LOW] CWE-73 Windows Storage Spoofing Vulnerability
Windows Storage Spoofing Vulnerability
Description: External control of file name or path in Windows Storage allows an authorized attacker to perform spoofing over a network.
FAQ: According to the CVSS metric, user interaction is required (UI:R) and privileges required is Low (PR:L). What does that mean for this vulnerability?
An authorized attacker with low privileges creates a scheduled task that is set to run when a user log
msrc
CVE-2025-32718HIGHCVSS 7.82025-06-10
CVE-2025-32718 [HIGH] CWE-190 Windows SMB Client Elevation of Privilege Vulnerability
Windows SMB Client Elevation of Privilege Vulnerability
Description: Integer overflow or wraparound in Windows SMB allows an authorized attacker to elevate privileges locally.
FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability?
An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.
Windows SMB: Windows SMB
Microsoft: Microsoft
msrc
CVE-2025-33071HIGHCVSS 8.12025-06-10
CVE-2025-33071 [HIGH] CWE-416 Windows KDC Proxy Service (KPSSVC) Remote Code Execution Vulnerability
Windows KDC Proxy Service (KPSSVC) Remote Code Execution Vulnerability
Description: Use after free in Windows KDC Proxy Service (KPSSVC) allows an unauthorized attacker to execute code over a network.
FAQ: How could an attacker exploit this vulnerability?
An unauthenticated attacker could use a specially crafted application to leverage a cryptographic protocol vulnerability in Kerberos Key Dist
msrc
CVE-2025-33050HIGHCVSS 7.52025-06-10
CVE-2025-33050 [HIGH] CWE-693 DHCP Server Service Denial of Service Vulnerability
DHCP Server Service Denial of Service Vulnerability
Description: Protection mechanism failure in Windows DHCP Server allows an unauthorized attacker to deny service over a network.
Windows DHCP Server: Windows DHCP Server
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Denial of Service
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely
Reference: h
msrc
CVE-2025-33067HIGHCVSS 8.42025-06-10
CVE-2025-33067 [HIGH] CWE-269 Windows Task Scheduler Elevation of Privilege Vulnerability
Windows Task Scheduler Elevation of Privilege Vulnerability
Description: Improper privilege management in Windows Kernel allows an unauthorized attacker to elevate privileges locally.
FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability?
An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.
FAQ: How could an attacker exploit t
msrc
CVE-2025-33070HIGHCVSS 8.12025-06-10
CVE-2025-33070 [HIGH] CWE-908 Windows Netlogon Elevation of Privilege Vulnerability
Windows Netlogon Elevation of Privilege Vulnerability
Description: Use of uninitialized resource in Windows Netlogon allows an unauthorized attacker to elevate privileges over a network.
FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?
Successful exploitation of this vulnerability requires an attacker to take additional actions prior to exploit
msrc
CVE-2025-29828HIGHCVSS 8.12025-06-10
CVE-2025-29828 [HIGH] CWE-401 Windows Schannel Remote Code Execution Vulnerability
Windows Schannel Remote Code Execution Vulnerability
Description: Missing release of memory after effective lifetime in Windows Cryptographic Services allows an unauthorized attacker to execute code over a network.
FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?
Successful exploitation of this vulnerability requires an attacker to send a large
msrc
CVE-2025-32716HIGHCVSS 7.82025-06-10
CVE-2025-32716 [HIGH] CWE-125 Windows Media Elevation of Privilege Vulnerability
Windows Media Elevation of Privilege Vulnerability
Description: Out-of-bounds read in Windows Media allows an authorized attacker to elevate privileges locally.
FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability?
An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.
Windows Media: Windows Media
Microsoft: Microsoft
Customer Action
msrc
CVE-2025-32725HIGHCVSS 7.52025-06-10
CVE-2025-32725 [HIGH] CWE-693 DHCP Server Service Denial of Service Vulnerability
DHCP Server Service Denial of Service Vulnerability
Description: Protection mechanism failure in Windows DHCP Server allows an unauthorized attacker to deny service over a network.
FAQ: According to the CVSS metrics, successful exploitation of this vulnerability could lead to major loss of availability (A:H). What does that mean for this vulnerability?
If an attacker was able to successfully exploit the vulnerabi
msrc
CVE-2025-32710HIGHCVSS 8.12025-06-10
CVE-2025-32710 [HIGH] CWE-416 Windows Remote Desktop Services Remote Code Execution Vulnerability
Windows Remote Desktop Services Remote Code Execution Vulnerability
Description: Use after free in Windows Remote Desktop Services allows an unauthorized attacker to execute code over a network.
FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?
Successful exploitation of this vulnerability requires an attacker to win a race conditi
msrc
CVE-2025-32721HIGHCVSS 7.32025-06-10
CVE-2025-32721 [HIGH] CWE-59 Windows Recovery Driver Elevation of Privilege Vulnerability
Windows Recovery Driver Elevation of Privilege Vulnerability
Description: Improper link resolution before file access ('link following') in Windows Recovery Driver allows an authorized attacker to elevate privileges locally.
FAQ: What privileges could be gained by an attacker who successfully exploited the vulnerability?
An attacker who successfully exploited this vulnerability could gain administrator pr
msrc