Msrc Windows Server 2022 23H2 Edition vulnerabilities
1,038 known vulnerabilities affecting msrc/windows_server_2022_23h2_edition.
Total CVEs
1,038
CISA KEV
33
actively exploited
Public exploits
14
Exploited in wild
16
Severity breakdown
CRITICAL12HIGH696MEDIUM326LOW4
Vulnerabilities
Page 29 of 52
CVE-2025-21235HIGHCVSS 7.82025-01-14
CVE-2025-21235 [HIGH] CWE-20 Windows PrintWorkflowUserSvc Elevation of Privilege Vulnerability
Windows PrintWorkflowUserSvc Elevation of Privilege Vulnerability
FAQ: What privileges could be gained by an attacker who successfully exploited the vulnerability?
An attacker could use this vulnerability to elevate privileges from a Low Integrity Level in a contained ("sandboxed") execution environment to a Medium Integrity Level.
Please refer to AppContainer isolation and Mandatory Integrity Control
msrc
CVE-2025-21207HIGHCVSS 7.52025-01-14
CVE-2025-21207 [HIGH] CWE-400 Windows Connected Devices Platform Service (Cdpsvc) Denial of Service Vulnerability
Windows Connected Devices Platform Service (Cdpsvc) Denial of Service Vulnerability
FAQ: According to the CVSS metrics, successful exploitation of this vulnerability could lead to major loss of availability (A:H). What does that mean for this vulnerability?
An attacker can send specially crafted packets which could affect availability of the service and result in Denial of Service (
msrc
CVE-2025-21309HIGHCVSS 8.12025-01-14
CVE-2025-21309 [HIGH] CWE-591 Windows Remote Desktop Services Remote Code Execution Vulnerability
Windows Remote Desktop Services Remote Code Execution Vulnerability
FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?
Successful exploitation of this vulnerability requires an attacker to win a race condition.
FAQ: How could an attacker exploit this vulnerability?
An attacker could successfully exploit this vulnerability by attempt
msrc
CVE-2025-21297HIGHCVSS 8.12025-01-14
CVE-2025-21297 [HIGH] CWE-416 Windows Remote Desktop Services Remote Code Execution Vulnerability
Windows Remote Desktop Services Remote Code Execution Vulnerability
FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?
Successful exploitation of this vulnerability requires an attacker to win a race condition.
FAQ: How could an attacker exploit this vulnerability?
An attacker could successfully exploit this vulnerability by attempt
msrc
CVE-2025-21333HIGHCVSS 7.8KEVPoC2025-01-14
CVE-2025-21333 [HIGH] CWE-122 Windows Hyper-V NT Kernel Integration VSP Elevation of Privilege Vulnerability
Windows Hyper-V NT Kernel Integration VSP Elevation of Privilege Vulnerability
FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability?
An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.
FAQ: Does this vulnerability exist in the Hyper-V server?
No, the Hyper-V NT Kernel Integration Virtual Service Provider (V
msrc
CVE-2025-21335HIGHCVSS 7.8KEV2025-01-14
CVE-2025-21335 [HIGH] CWE-416 Windows Hyper-V NT Kernel Integration VSP Elevation of Privilege Vulnerability
Windows Hyper-V NT Kernel Integration VSP Elevation of Privilege Vulnerability
FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability?
An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.
FAQ: Does this vulnerability exist in the Hyper-V server?
No, the Hyper-V NT Kernel Integration Virtual Service Provider (V
msrc
CVE-2025-21378HIGHCVSS 7.82025-01-14
CVE-2025-21378 [HIGH] CWE-122 Windows CSC Service Elevation of Privilege Vulnerability
Windows CSC Service Elevation of Privilege Vulnerability
FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability?
An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.
Windows Client-Side Caching (CSC) Service: Windows Client-Side Caching (CSC) Service
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Elevation of Privile
msrc
CVE-2025-21382HIGHCVSS 7.82025-01-14
CVE-2025-21382 [HIGH] CWE-190 Windows Graphics Component Elevation of Privilege Vulnerability
Windows Graphics Component Elevation of Privilege Vulnerability
FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability?
An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.
Microsoft Graphics Component: Microsoft Graphics Component
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Elevation of Privilege
Exploit
msrc
CVE-2025-21275HIGHCVSS 7.82025-01-14
CVE-2025-21275 [HIGH] CWE-285 Windows App Package Installer Elevation of Privilege Vulnerability
Windows App Package Installer Elevation of Privilege Vulnerability
FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability?
An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.
Windows Installer: Windows Installer
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Elevation of Privilege
Exploit Status: Publicly
msrc
CVE-2025-21334HIGHCVSS 7.8KEV2025-01-14
CVE-2025-21334 [HIGH] CWE-416 Windows Hyper-V NT Kernel Integration VSP Elevation of Privilege Vulnerability
Windows Hyper-V NT Kernel Integration VSP Elevation of Privilege Vulnerability
FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability?
An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.
FAQ: Does this vulnerability exist in the Hyper-V server?
No, the Hyper-V NT Kernel Integration Virtual Service Provider (V
msrc
CVE-2025-21372HIGHCVSS 7.82025-01-14
CVE-2025-21372 [HIGH] CWE-416 Microsoft Brokering File System Elevation of Privilege Vulnerability
Microsoft Brokering File System Elevation of Privilege Vulnerability
FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?
Successful exploitation of this vulnerability requires an attacker to win a race condition.
FAQ: According to the CVSS metric, successful exploitation could lead to a scope change (S:C). What does this mean for th
msrc
CVE-2025-21295HIGHCVSS 8.12025-01-14
CVE-2025-21295 [HIGH] CWE-416 SPNEGO Extended Negotiation (NEGOEX) Security Mechanism Remote Code Execution Vulnerability
SPNEGO Extended Negotiation (NEGOEX) Security Mechanism Remote Code Execution Vulnerability
FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?
Successful exploitation of this vulnerability requires an attacker to manipulate system operations in a specific manner.
FAQ: How could an attacker exploit the vulnera
msrc
CVE-2025-21330HIGHCVSS 7.52025-01-14
CVE-2025-21330 [HIGH] CWE-400 Windows Remote Desktop Services Denial of Service Vulnerability
Windows Remote Desktop Services Denial of Service Vulnerability
FAQ: According to the CVSS metrics, successful exploitation of this vulnerability could lead to major loss of availability (A:H). What does that mean for this vulnerability?
An attacker can send specially crafted packets which could affect availability of the service and result in Denial of Service (DoS).
Windows Remote Desktop Services:
msrc
CVE-2025-21291HIGHCVSS 8.82025-01-14
CVE-2025-21291 [HIGH] CWE-415 Windows Direct Show Remote Code Execution Vulnerability
Windows Direct Show Remote Code Execution Vulnerability
FAQ: According to the CVSS metric, the attack vector is network (AV:N) and the user interaction is required (UI:R). What is the target context of the remote code execution?
This attack requires an authenticated client to click a link so that an unauthenticated attacker can initiate remote code execution.
FAQ: How could an attacker exploit the vulnerabili
msrc
CVE-2025-21248HIGHCVSS 8.82025-01-14
CVE-2025-21248 [HIGH] CWE-122 Windows Telephony Service Remote Code Execution Vulnerability
Windows Telephony Service Remote Code Execution Vulnerability
FAQ: How could an attacker exploit this vulnerability?
An attacker could exploit this vulnerability by tricking a user into sending a request to a malicious server. This could result in the server returning malicious data that might cause arbitrary code execution on the user's system.
Windows Telephony Service: Windows Telephony Service
Micr
msrc
CVE-2025-21296HIGHCVSS 7.52025-01-14
CVE-2025-21296 [HIGH] CWE-416 BranchCache Remote Code Execution Vulnerability
BranchCache Remote Code Execution Vulnerability
FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?
Successful exploitation of this vulnerability requires an attacker to win a race condition.
FAQ: According to the CVSS score, the attack vector is adjacent (AV:A). What does this mean for this vulnerability?
This attack is limited to systems connected to
msrc
CVE-2025-21218HIGHCVSS 7.52025-01-14
CVE-2025-21218 [HIGH] CWE-400 Windows Kerberos Denial of Service Vulnerability
Windows Kerberos Denial of Service Vulnerability
FAQ: How could an attacker exploit this vulnerability?
An unauthenticated attacker could use a specially crafted application to leverage a protocol vulnerability in the Kerberos Key Distribution Center (KDC) Proxy Service to perform denial of service against the target.
Windows Kerberos: Windows Kerberos
Microsoft: Microsoft
Customer Action Required: Yes
Impact: De
msrc
CVE-2025-21241HIGHCVSS 8.82025-01-14
CVE-2025-21241 [HIGH] CWE-122 Windows Telephony Service Remote Code Execution Vulnerability
Windows Telephony Service Remote Code Execution Vulnerability
FAQ: How could an attacker exploit this vulnerability?
An attacker could exploit this vulnerability by tricking a user into sending a request to a malicious server. This could result in the server returning malicious data that might cause arbitrary code execution on the user's system.
Windows Telephony Service: Windows Telephony Service
Micr
msrc
CVE-2025-21292HIGHCVSS 8.82025-01-14
CVE-2025-21292 [HIGH] CWE-94 Windows Search Service Elevation of Privilege Vulnerability
Windows Search Service Elevation of Privilege Vulnerability
FAQ: How could an attacker exploit this vulnerability?
To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that could exploit the vulnerability and take control of an affected system.
FAQ: What privileges could be gained by an attacker who successfully expl
msrc
CVE-2025-21323MEDIUMCVSS 5.52025-01-14
CVE-2025-21323 [MEDIUM] CWE-532 Windows Kernel Memory Information Disclosure Vulnerability
Windows Kernel Memory Information Disclosure Vulnerability
FAQ: What type of information could be disclosed by this vulnerability?
Exploiting this vulnerability could allow the disclosure of certain memory address within kernel space. Knowing the exact location of kernel memory could be potentially leveraged by an attacker for other malicious activities.
Windows Kernel Memory: Windows Kernel Memory
Micr
msrc