Msrc Windows Server 2022 23H2 Edition vulnerabilities

1,038 known vulnerabilities affecting msrc/windows_server_2022_23h2_edition.

Total CVEs
1,038
CISA KEV
33
actively exploited
Public exploits
14
Exploited in wild
16
Severity breakdown
CRITICAL12HIGH696MEDIUM326LOW4

Vulnerabilities

Page 46 of 52
CVE-2024-26256HIGHCVSS 7.82024-04-09
CVE-2024-26256 [HIGH] CWE-122 Libarchive Remote Code Execution Vulnerability Libarchive Remote Code Execution Vulnerability FAQ: According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution? The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally. This means an attacker or victim needs to e
msrc
CVE-2024-26236HIGHCVSS 7.02024-04-09
CVE-2024-26236 [HIGH] CWE-591 Windows Update Stack Elevation of Privilege Vulnerability Windows Update Stack Elevation of Privilege Vulnerability FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability? Successful exploitation of this vulnerability re
msrc
CVE-2024-26231HIGHCVSS 7.22024-04-09
CVE-2024-26231 [HIGH] CWE-416 Windows DNS Server Remote Code Execution Vulnerability Windows DNS Server Remote Code Execution Vulnerability FAQ: How could an attacker exploit this vulnerability? In a network-based attack an attacker would need to have the privileges to query the Domain Name Service (DNS). If the timing of DNS queries is perfect, the attacker could execute code remotely on the target server. Role: DNS Server: Role: DNS Server Microsoft: Microsoft Customer Action Required: Yes
msrc
CVE-2024-29988HIGHCVSS 8.8KEV2024-04-09
CVE-2024-29988 [HIGH] CWE-693 SmartScreen Prompt Security Feature Bypass Vulnerability SmartScreen Prompt Security Feature Bypass Vulnerability FAQ: How could an attacker exploit the vulnerability? In an email or instant message attack scenario, the attacker could send the targeted user a specially crafted file that is designed to exploit the remote code execution vulnerability. In any case an attacker would have no way to force a user to view attacker-controlled content. Instead, an attacker w
msrc
CVE-2024-20693HIGHCVSS 7.82024-04-09
CVE-2024-20693 [HIGH] CWE-426 Windows Kernel Elevation of Privilege Vulnerability Windows Kernel Elevation of Privilege Vulnerability FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. Windows Kernel: Windows Kernel Microsoft: Microsoft Customer Action Required: Yes Impact: Elevation of Privilege Exploit Status: Publicly Disclosed:No;Exploited:No;Latest So
msrc
CVE-2024-26222HIGHCVSS 7.22024-04-09
CVE-2024-26222 [HIGH] CWE-416 Windows DNS Server Remote Code Execution Vulnerability Windows DNS Server Remote Code Execution Vulnerability FAQ: How could an attacker exploit this vulnerability? In a network-based attack an attacker would need to have the privileges to query the Domain Name Service (DNS). If the timing of DNS queries is perfect, the attacker could execute code remotely on the target server. Role: DNS Server: Role: DNS Server Microsoft: Microsoft Customer Action Required: Yes
msrc
CVE-2024-26235HIGHCVSS 7.82024-04-09
CVE-2024-26235 [HIGH] CWE-306 Windows Update Stack Elevation of Privilege Vulnerability Windows Update Stack Elevation of Privilege Vulnerability FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could overwrite arbitrary file content in the security context of the local system. Windows Update Stack: Windows Update Stack Microsoft: Microsoft Customer Action Required: Yes Impact: Elevat
msrc
CVE-2024-28904HIGHCVSS 7.82024-04-09
CVE-2024-28904 [HIGH] CWE-269 Microsoft Brokering File System Elevation of Privilege Vulnerability Microsoft Brokering File System Elevation of Privilege Vulnerability FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability? Successful exploitation of this vulnerability requires multiple conditions to be met, such as specific application behavior, user actions, manipulation of parameters passed to a function, and impersonation of an in
msrc
CVE-2024-26221HIGHCVSS 7.22024-04-09
CVE-2024-26221 [HIGH] CWE-416 Windows DNS Server Remote Code Execution Vulnerability Windows DNS Server Remote Code Execution Vulnerability FAQ: How could an attacker exploit this vulnerability? In a network-based attack an attacker would need to have the privileges to query the Domain Name Service (DNS). If the timing of DNS queries is perfect, the attacker could execute code remotely on the target server. Role: DNS Server: Role: DNS Server Microsoft: Microsoft Customer Action Required: Yes
msrc
CVE-2024-26254HIGHCVSS 7.52024-04-09
CVE-2024-26254 [HIGH] CWE-822 Microsoft Virtual Machine Bus (VMBus) Denial of Service Vulnerability Microsoft Virtual Machine Bus (VMBus) Denial of Service Vulnerability Windows Virtual Machine Bus: Windows Virtual Machine Bus Microsoft: Microsoft Customer Action Required: Yes Impact: Denial of Service Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;DOS:N/A Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5036896 R
msrc
CVE-2024-26224HIGHCVSS 7.22024-04-09
CVE-2024-26224 [HIGH] CWE-416 Windows DNS Server Remote Code Execution Vulnerability Windows DNS Server Remote Code Execution Vulnerability FAQ: How could an attacker exploit this vulnerability? In a network-based attack an attacker would need to have the privileges to query the Domain Name Service (DNS). If the timing of DNS queries is perfect, the attacker could execute code remotely on the target server. Role: DNS Server: Role: DNS Server Microsoft: Microsoft Customer Action Required: Yes
msrc
CVE-2024-26218HIGHCVSS 7.82024-04-09
CVE-2024-26218 [HIGH] CWE-367 Windows Kernel Elevation of Privilege Vulnerability Windows Kernel Elevation of Privilege Vulnerability FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. Windows Kernel: Windows Kernel Microsoft: Microsoft Customer Action Required: Yes Impact: Elevation of Privilege Exploit Status: Publicly Disclosed:No;Exploited:No;Latest So
msrc
CVE-2024-26233HIGHCVSS 7.22024-04-09
CVE-2024-26233 [HIGH] CWE-416 Windows DNS Server Remote Code Execution Vulnerability Windows DNS Server Remote Code Execution Vulnerability FAQ: How could an attacker exploit this vulnerability? In a network-based attack an attacker would need to have the privileges to query the Domain Name Service (DNS). If the timing of DNS queries is perfect, the attacker could execute code remotely on the target server. Role: DNS Server: Role: DNS Server Microsoft: Microsoft Customer Action Required: Yes
msrc
CVE-2024-29061HIGHCVSS 7.82024-04-09
CVE-2024-29061 [MEDIUM] CWE-121 Secure Boot Security Feature Bypass Vulnerability Secure Boot Security Feature Bypass Vulnerability FAQ: What kind of security feature could be bypassed by successfully exploiting this vulnerability? An attacker who successfully exploited this vulnerability could bypass Secure Boot. FAQ: Are there additional steps I need to take to be protected from this vulnerability? All customers should apply the April 9, 2024 Windows security updates. These security updates
msrc
CVE-2024-26223HIGHCVSS 7.22024-04-09
CVE-2024-26223 [HIGH] CWE-416 Windows DNS Server Remote Code Execution Vulnerability Windows DNS Server Remote Code Execution Vulnerability FAQ: How could an attacker exploit this vulnerability? In a network-based attack an attacker would need to have the privileges to query the Domain Name Service (DNS). If the timing of DNS queries is perfect, the attacker could execute code remotely on the target server. Role: DNS Server: Role: DNS Server Microsoft: Microsoft Customer Action Required: Yes
msrc
CVE-2024-29066HIGHCVSS 7.22024-04-09
CVE-2024-29066 [HIGH] CWE-367 Windows Distributed File System (DFS) Remote Code Execution Vulnerability Windows Distributed File System (DFS) Remote Code Execution Vulnerability FAQ: How could an attacker exploit this vulnerability? An attacker could exploit a DFS namespace (non-default) out-of-bound write vulnerability that results in heap corruption, which could then be used to perform arbitrary code execution on the server's dfssvc.exe process which runs as SYSTEM user. Windows Distributed
msrc
CVE-2024-28896HIGHCVSS 7.52024-04-09
CVE-2024-28896 [MEDIUM] CWE-122 Secure Boot Security Feature Bypass Vulnerability Secure Boot Security Feature Bypass Vulnerability FAQ: According to the CVSS metric, the attack vector is adjacent (AV:A). What does that mean for this vulnerability? An authenticated attacker could exploit this vulnerability with LAN access. FAQ: What kind of security feature could be bypassed by successfully exploiting this vulnerability? An attacker who successfully exploited this vulnerability could bypass Se
msrc
CVE-2024-26180HIGHCVSS 8.02024-04-09
CVE-2024-26180 [MEDIUM] CWE-121 Secure Boot Security Feature Bypass Vulnerability Secure Boot Security Feature Bypass Vulnerability FAQ: What kind of security feature could be bypassed by successfully exploiting this vulnerability? An attacker who successfully exploited this vulnerability could bypass Secure Boot. FAQ: According to the CVSS metric, the attack vector is adjacent (AV:A). What does that mean for this vulnerability? An authenticated attacker could exploit this vulnerability with L
msrc
CVE-2024-26212HIGHCVSS 7.52024-04-09
CVE-2024-26212 [HIGH] CWE-400 DHCP Server Service Denial of Service Vulnerability DHCP Server Service Denial of Service Vulnerability Windows DHCP Server: Windows DHCP Server Microsoft: Microsoft Customer Action Required: Yes Impact: Denial of Service Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation More Likely;DOS:N/A Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5036896 Reference: https://support.microsoft.com/help/5036896
msrc
CVE-2024-28920HIGHCVSS 7.82024-04-09
CVE-2024-28920 [MEDIUM] CWE-693 Secure Boot Security Feature Bypass Vulnerability Secure Boot Security Feature Bypass Vulnerability FAQ: What kind of security feature could be bypassed by successfully exploiting this vulnerability? An attacker who successfully exploited this vulnerability could bypass Secure Boot. FAQ: Are there additional steps I need to take to be protected from this vulnerability? All customers should apply the April 9, 2024 Windows security updates. These security updates
msrc