Msrc Windows Server 2022 23H2 Edition vulnerabilities
1,038 known vulnerabilities affecting msrc/windows_server_2022_23h2_edition.
Total CVEs
1,038
CISA KEV
33
actively exploited
Public exploits
14
Exploited in wild
16
Severity breakdown
CRITICAL12HIGH696MEDIUM326LOW4
Vulnerabilities
Page 51 of 52
CVE-2024-20699MEDIUMCVSS 5.52024-01-09
CVE-2024-20699 [MEDIUM] CWE-755 Windows Hyper-V Denial of Service Vulnerability
Windows Hyper-V Denial of Service Vulnerability
FAQ: How could an attacker exploit this vulnerability?
An authenticated attacker could run a specially crafted application on a vulnerable Hyper-V guest to exploit this vulnerability which, if successful, could potentially interact with processes of another Hyper-V guest hosted on the same Hyper-V host.
Windows Hyper-V: Windows Hyper-V
Microsoft: Microsoft
Customer
msrc
CVE-2024-20694MEDIUMCVSS 5.52024-01-09
CVE-2024-20694 [MEDIUM] CWE-908 Windows CoreMessaging Information Disclosure Vulnerability
Windows CoreMessaging Information Disclosure Vulnerability
FAQ: What type of information could be disclosed by this vulnerability?
An attacker who successfully exploited this vulnerability could potentially read small portions of stack memory.
Windows Collaborative Translation Framework: Windows Collaborative Translation Framework
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Information
msrc
CVE-2024-21306MEDIUMCVSS 5.72024-01-09
CVE-2024-21306 [MEDIUM] CWE-306 Microsoft Bluetooth Driver Spoofing Vulnerability
Microsoft Bluetooth Driver Spoofing Vulnerability
FAQ: According to the CVSS metric, the attack vector is adjacent (AV:A). What does that mean for this vulnerability?
Exploiting this vulnerability requires an attacker to be within proximity of the target system to send and receive radio transmissions.
FAQ: According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to d
msrc
CVE-2024-20662MEDIUMCVSS 4.92024-01-09
CVE-2024-20662 [MEDIUM] CWE-843 Windows Online Certificate Status Protocol (OCSP) Information Disclosure Vulnerability
Windows Online Certificate Status Protocol (OCSP) Information Disclosure Vulnerability
FAQ: What type of information could be disclosed by this vulnerability?
The type of information that could be disclosed if an attacker successfully exploited this vulnerability is remote heap memory.
FAQ: According to the CVSS metric, privileges required is high (PR:H). What does that mean f
msrc
CVE-2024-21316MEDIUMCVSS 6.12024-01-09
CVE-2024-21316 [MEDIUM] CWE-20 Windows Server Key Distribution Service Security Feature Bypass
Windows Server Key Distribution Service Security Feature Bypass
FAQ: How can an attacker successfully exploit this vulnerability?
This vulnerability can be exploited when an attacker with admin privileges creates an x509 certificate with an MD5 property, which causes certificate validation to fail with no further validation checks.
Windows Server Key Distribution Service: Windows Server Key Distribut
msrc
CVE-2024-20666MEDIUMCVSS 6.62024-01-09
CVE-2024-20666 [MEDIUM] CWE-20 BitLocker Security Feature Bypass Vulnerability
BitLocker Security Feature Bypass Vulnerability
FAQ: What kind of security feature could be bypassed by successfully exploiting this vulnerability?
A successful attacker could bypass the BitLocker Device Encryption feature on the system storage device. An attacker with physical access to the target could exploit this vulnerability to gain access to encrypted data.
FAQ: Are there additional steps that I need to take
msrc
CVE-2024-20655MEDIUMCVSS 6.62024-01-09
CVE-2024-20655 [MEDIUM] CWE-416 Microsoft Online Certificate Status Protocol (OCSP) Remote Code Execution Vulnerability
Microsoft Online Certificate Status Protocol (OCSP) Remote Code Execution Vulnerability
FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?
Successful exploitation of this vulnerability requires an attacker to win a race condition.
FAQ: According to the CVSS metric, privileges required is high (PR:H). What does
msrc
CVE-2024-20691MEDIUMCVSS 4.72024-01-09
CVE-2024-20691 [MEDIUM] CWE-125 Windows Themes Information Disclosure Vulnerability
Windows Themes Information Disclosure Vulnerability
FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?
Successful exploitation of this vulnerability requires an attacker to win a race condition.
FAQ: What type of information could be disclosed by this vulnerability?
Exploiting this vulnerability could allow the disclosure of initialized or uninit
msrc
CVE-2024-21305MEDIUMCVSS 4.42024-01-09
CVE-2024-21305 [MEDIUM] CWE-732 Hypervisor-Protected Code Integrity (HVCI) Security Feature Bypass Vulnerability
Hypervisor-Protected Code Integrity (HVCI) Security Feature Bypass Vulnerability
FAQ: According to the CVSS metric, privileges required is high (PR:H). What does that mean for this vulnerability?
Successful exploitation of this vulnerability requires an attacker to compromise admin credentials on the device.
FAQ: What kind of security feature could be bypassed by successfully exploi
msrc
CVE-2023-35622HIGHCVSS 7.52023-12-12
CVE-2023-35622 [HIGH] Windows DNS Spoofing Vulnerability
Windows DNS Spoofing Vulnerability
Microsoft Windows DNS: Microsoft Windows DNS
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Spoofing
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;DOS:N/A
Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5033371
Reference: https://support.microsoft.com/help/5033371
Reference: https://catalog.update.microsoft.c
msrc
CVE-2023-35638HIGHCVSS 7.52023-12-12
CVE-2023-35638 [HIGH] CWE-126 DHCP Server Service Denial of Service Vulnerability
DHCP Server Service Denial of Service Vulnerability
Windows DHCP Server: Windows DHCP Server
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Denial of Service
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;DOS:N/A
Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5033371
Reference: https://support.microsoft.com/help/5033371
msrc
CVE-2023-35644HIGHCVSS 7.82023-12-12
CVE-2023-35644 [HIGH] CWE-190 Windows Sysmain Service Elevation of Privilege Vulnerability
Windows Sysmain Service Elevation of Privilege Vulnerability
FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability?
An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.
Windows Kernel-Mode Drivers: Windows Kernel-Mode Drivers
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Elevation of Privilege
Exploit Status:
msrc
CVE-2023-21740HIGHCVSS 7.82023-12-12
CVE-2023-21740 [HIGH] CWE-122 Windows Media Remote Code Execution Vulnerability
Windows Media Remote Code Execution Vulnerability
FAQ: According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution?
The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally.
For example, when the score indicates
msrc
CVE-2023-35643HIGHCVSS 7.52023-12-12
CVE-2023-35643 [HIGH] CWE-126 DHCP Server Service Information Disclosure Vulnerability
DHCP Server Service Information Disclosure Vulnerability
FAQ: What type of information could be disclosed by this vulnerability?
The type of information that could be disclosed if an attacker successfully exploited this vulnerability is remote heap memory.
Windows DHCP Server: Windows DHCP Server
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Information Disclosure
Exploit Status: Publicly Di
msrc
CVE-2023-36696HIGHCVSS 7.82023-12-12
CVE-2023-36696 [HIGH] CWE-125 Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability
Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability
FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability?
An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.
Windows Cloud Files Mini Filter Driver: Windows Cloud Files Mini Filter Driver
Microsoft: Microsoft
Customer Action Required: Y
msrc
CVE-2023-35631HIGHCVSS 7.82023-12-12
CVE-2023-35631 [HIGH] Win32k Elevation of Privilege Vulnerability
Win32k Elevation of Privilege Vulnerability
FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability?
An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.
Windows Win32K: Windows Win32K
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Elevation of Privilege
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitat
msrc
CVE-2023-36011HIGHCVSS 7.82023-12-12
CVE-2023-36011 [HIGH] CWE-822 Win32k Elevation of Privilege Vulnerability
Win32k Elevation of Privilege Vulnerability
FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability?
An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.
Windows Win32K: Windows Win32K
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Elevation of Privilege
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:E
msrc
CVE-2023-35628HIGHCVSS 8.12023-12-12
CVE-2023-35628 [HIGH] CWE-416 Windows MSHTML Platform Remote Code Execution Vulnerability
Windows MSHTML Platform Remote Code Execution Vulnerability
FAQ: How could an attacker exploit this vulnerability?
Exploitation of this vulnerability requires that an attacker send a malicious link to the victim via email, or that they convince the user to click the link, typically by way of an enticement in an email or Instant Messenger message. In the worst-case email attack scenario, an attacker could s
msrc
CVE-2023-36012MEDIUMCVSS 5.32023-12-12
CVE-2023-36012 [MEDIUM] CWE-908 DHCP Server Service Information Disclosure Vulnerability
DHCP Server Service Information Disclosure Vulnerability
FAQ: What type of information could be disclosed by this vulnerability?
The type of information that could be disclosed if an attacker successfully exploited this vulnerability is uninitialized memory.
FAQ: According to the CVSS metrics, successful exploitation of this vulnerability could lead to some loss of confidentiality (C:L) but have no effect
msrc
CVE-2023-36003MEDIUMCVSS 6.72023-12-12
CVE-2023-36003 [MEDIUM] CWE-426 XAML Diagnostics Elevation of Privilege Vulnerability
XAML Diagnostics Elevation of Privilege Vulnerability
FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability?
An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.
FAQ: According to the CVSS metric, user interaction is required (UI:R) and privileges required is Low (PR:L). What does that mean for this vulnerability?
An authorized att
msrc