Msrc Windows Server 2022 23H2 Edition vulnerabilities

1,038 known vulnerabilities affecting msrc/windows_server_2022_23h2_edition.

Total CVEs
1,038
CISA KEV
33
actively exploited
Public exploits
14
Exploited in wild
16
Severity breakdown
CRITICAL12HIGH696MEDIUM326LOW4

Vulnerabilities

Page 6 of 52
CVE-2026-20926HIGHCVSS 7.52026-01-13
CVE-2026-20926 [HIGH] CWE-362 Windows SMB Server Elevation of Privilege Vulnerability Windows SMB Server Elevation of Privilege Vulnerability Description: Concurrent execution using shared resource with improper synchronization ('race condition') in Windows SMB Server allows an authorized attacker to elevate privileges over a network. FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability? Successful exploitation of this vulnerabilit
msrc
CVE-2026-20867HIGHCVSS 7.82026-01-13
CVE-2026-20867 [HIGH] CWE-362 Windows Management Services Elevation of Privilege Vulnerability Windows Management Services Elevation of Privilege Vulnerability Description: Concurrent execution using shared resource with improper synchronization ('race condition') in Windows Management Services allows an authorized attacker to elevate privileges locally. FAQ: According to the CVSS metric, successful exploitation could lead to a scope change (S:C). What does this mean for this vulnerability? In
msrc
CVE-2026-20808HIGHCVSS 7.02026-01-13
CVE-2026-20808 [HIGH] CWE-362 Windows File Explorer Elevation of Privilege Vulnerability Windows File Explorer Elevation of Privilege Vulnerability Description: Concurrent execution using shared resource with improper synchronization ('race condition') in Printer Association Object allows an authorized attacker to elevate privileges locally. FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability? Successful exploitation of this vulne
msrc
CVE-2026-20875HIGHCVSS 7.52026-01-13
CVE-2026-20875 [HIGH] CWE-476 Windows Local Security Authority Subsystem Service (LSASS) Denial of Service Vulnerability Windows Local Security Authority Subsystem Service (LSASS) Denial of Service Vulnerability Description: Null pointer dereference in Windows Local Security Authority Subsystem Service (LSASS) allows an unauthorized attacker to deny service over a network. Windows Local Security Authority Subsystem Service (LSASS): Windows Local Security Authority Subsystem Service (LSASS) Mi
msrc
CVE-2026-20816HIGHCVSS 7.82026-01-13
CVE-2026-20816 [HIGH] CWE-367 Windows Installer Elevation of Privilege Vulnerability Windows Installer Elevation of Privilege Vulnerability Description: Time-of-check time-of-use (toctou) race condition in Windows Installer allows an authorized attacker to elevate privileges locally. FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. Windows Installer: Window
msrc
CVE-2024-55414HIGHCVSS 7.82026-01-13
CVE-2024-55414 [CRITICAL] CWE-122 Windows Motorola Soft Modem Driver Elevation of Privilege Vulnerability Windows Motorola Soft Modem Driver Elevation of Privilege Vulnerability Description: Microsoft is aware of vulnerabilities in the third party Motorola Soft Modem drivers that ships natively with supported Windows operating systems. This is an announcement of the upcoming removal of smserl64.sys and smserial.sys drivers. The drivers have been removed in the January cumulative update. Soft mo
msrc
CVE-2026-20918HIGHCVSS 7.82026-01-13
CVE-2026-20918 [HIGH] CWE-362 Windows Management Services Elevation of Privilege Vulnerability Windows Management Services Elevation of Privilege Vulnerability Description: Concurrent execution using shared resource with improper synchronization ('race condition') in Windows Management Services allows an authorized attacker to elevate privileges locally. FAQ: According to the CVSS metric, successful exploitation could lead to a scope change (S:C). What does this mean for this vulnerability? In
msrc
CVE-2026-20837HIGHCVSS 7.82026-01-13
CVE-2026-20837 [HIGH] CWE-122 Windows Media Remote Code Execution Vulnerability Windows Media Remote Code Execution Vulnerability Description: Heap-based buffer overflow in Windows Media allows an unauthorized attacker to execute code locally. FAQ: According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution? The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to
msrc
CVE-2026-20814HIGHCVSS 7.02026-01-13
CVE-2026-20814 [HIGH] CWE-362 DirectX Graphics Kernel Elevation of Privilege Vulnerability DirectX Graphics Kernel Elevation of Privilege Vulnerability Description: Concurrent execution using shared resource with improper synchronization ('race condition') in Graphics Kernel allows an authorized attacker to elevate privileges locally. FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability? Successful exploitation of this vulnerabilit
msrc
CVE-2026-20804HIGHCVSS 7.72026-01-13
CVE-2026-20804 [HIGH] CWE-266 Windows Hello Tampering Vulnerability Windows Hello Tampering Vulnerability Description: Incorrect privilege assignment in Windows Hello allows an unauthorized attacker to perform tampering locally. Windows Hello: Windows Hello Microsoft: Microsoft Customer Action Required: Yes Impact: Tampering Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Unlikely Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q
msrc
CVE-2026-20873HIGHCVSS 7.82026-01-13
CVE-2026-20873 [HIGH] CWE-362 Windows Management Services Elevation of Privilege Vulnerability Windows Management Services Elevation of Privilege Vulnerability Description: Concurrent execution using shared resource with improper synchronization ('race condition') in Windows Management Services allows an authorized attacker to elevate privileges locally. FAQ: What privileges could be gained by an attacker who successfully exploited the vulnerability? An attacker could use this vulnerability to
msrc
CVE-2026-20857HIGHCVSS 7.82026-01-13
CVE-2026-20857 [HIGH] CWE-822 Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability Description: Untrusted pointer dereference in Windows Cloud Files Mini Filter Driver allows an authorized attacker to elevate privileges locally. FAQ: What privileges could be gained by an attacker who successfully exploited the vulnerability? An attacker who successfully exploited this vulnerability could gain spe
msrc
CVE-2026-20861HIGHCVSS 7.82026-01-13
CVE-2026-20861 [HIGH] CWE-362 Windows Management Services Elevation of Privilege Vulnerability Windows Management Services Elevation of Privilege Vulnerability Description: Concurrent execution using shared resource with improper synchronization ('race condition') in Windows Management Services allows an authorized attacker to elevate privileges locally. FAQ: What privileges could be gained by an attacker who successfully exploited the vulnerability? An attacker could use this vulnerability to
msrc
CVE-2026-20864HIGHCVSS 7.82026-01-13
CVE-2026-20864 [HIGH] CWE-122 Windows Connected Devices Platform Service Elevation of Privilege Vulnerability Windows Connected Devices Platform Service Elevation of Privilege Vulnerability Description: Heap-based buffer overflow in Connected Devices Platform Service (Cdpsvc) allows an authorized attacker to elevate privileges locally. FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability cou
msrc
CVE-2026-20863HIGHCVSS 7.02026-01-13
CVE-2026-20863 [HIGH] CWE-415 Win32k Elevation of Privilege Vulnerability Win32k Elevation of Privilege Vulnerability Description: Double free in Windows Win32K - ICOMP allows an authorized attacker to elevate privileges locally. FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability? Successful exploitation of this vulnerability requires an attacker to win a race condition. FAQ: What privileges could be gained by an attacker who su
msrc
CVE-2026-20923HIGHCVSS 7.82026-01-13
CVE-2026-20923 [HIGH] CWE-416 Windows Management Services Elevation of Privilege Vulnerability Windows Management Services Elevation of Privilege Vulnerability Description: Use after free in Windows Management Services allows an authorized attacker to elevate privileges locally. FAQ: According to the CVSS metric, successful exploitation could lead to a scope change (S:C). What does this mean for this vulnerability? In this case, a successful attack could be performed from a low privilege AppCo
msrc
CVE-2026-20826HIGHCVSS 7.82026-01-13
CVE-2026-20826 [HIGH] CWE-362 Tablet Windows User Interface (TWINUI) Subsystem Information Disclosure Vulnerability Tablet Windows User Interface (TWINUI) Subsystem Information Disclosure Vulnerability Description: Concurrent execution using shared resource with improper synchronization ('race condition') in Tablet Windows User Interface (TWINUI) Subsystem allows an authorized attacker to elevate privileges locally. FAQ: What privileges could be gained by an attacker who successfully exploited
msrc
CVE-2026-20924HIGHCVSS 7.82026-01-13
CVE-2026-20924 [HIGH] CWE-416 Windows Management Services Elevation of Privilege Vulnerability Windows Management Services Elevation of Privilege Vulnerability Description: Use after free in Windows Management Services allows an authorized attacker to elevate privileges locally. FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability? Successful exploitation of this vulnerability requires an attacker to win a race condition. FAQ: Acc
msrc
CVE-2026-20868HIGHCVSS 8.82026-01-13
CVE-2026-20868 [HIGH] CWE-122 Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability Description: Heap-based buffer overflow in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to execute code over a network. FAQ: How could an attacker exploit this vulnerability? An attacker authenticated on the domain could exploit this vulnerability by tricking a
msrc
CVE-2026-20847MEDIUMCVSS 6.52026-01-13
CVE-2026-20847 [MEDIUM] CWE-200 Microsoft Windows File Explorer Spoofing Vulnerability Microsoft Windows File Explorer Spoofing Vulnerability Description: Exposure of sensitive information to an unauthorized actor in Windows Shell allows an authorized attacker to perform spoofing over a network. Windows Shell: Windows Shell Microsoft: Microsoft Customer Action Required: Yes Impact: Spoofing Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Unlikely Re
msrc