Msrc Windows Server 2025 vulnerabilities
604 known vulnerabilities affecting msrc/windows_server_2025.
Total CVEs
604
CISA KEV
14
actively exploited
Public exploits
9
Exploited in wild
2
Severity breakdown
CRITICAL7HIGH401MEDIUM192LOW4
Vulnerabilities
Page 1 of 31
CVE-2026-24290HIGHCVSS 7.82026-03-10
CVE-2026-24290 [HIGH] CWE-284 Windows Projected File System Elevation of Privilege Vulnerability
Windows Projected File System Elevation of Privilege Vulnerability
Description: Improper access control in Windows Projected File System allows an authorized attacker to elevate privileges locally.
FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability?
An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.
Windows Project
msrc
CVE-2026-25167HIGHCVSS 7.42026-03-10
CVE-2026-25167 [HIGH] CWE-416 Microsoft Brokering File System Elevation of Privilege Vulnerability
Microsoft Brokering File System Elevation of Privilege Vulnerability
Description: Use after free in Microsoft Brokering File System allows an unauthorized attacker to elevate privileges locally.
FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?
Successful exploitation of this vulnerability requires an attacker to win a race condit
msrc
CVE-2026-24295HIGHCVSS 7.02026-03-10
CVE-2026-24295 [HIGH] CWE-362 Windows Device Association Service Elevation of Privilege Vulnerability
Windows Device Association Service Elevation of Privilege Vulnerability
Description: Concurrent execution using shared resource with improper synchronization ('race condition') in Windows Device Association Service allows an authorized attacker to elevate privileges locally.
FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability?
An attacker who succe
msrc
CVE-2026-24287HIGHCVSS 7.82026-03-10
CVE-2026-24287 [HIGH] CWE-73 Windows Kernel Elevation of Privilege Vulnerability
Windows Kernel Elevation of Privilege Vulnerability
Description: External control of file name or path in Windows Kernel allows an authorized attacker to elevate privileges locally.
FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability?
An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.
Windows Kernel: Windows Kernel
Microsoft: Micr
msrc
CVE-2026-24296HIGHCVSS 7.02026-03-10
CVE-2026-24296 [HIGH] CWE-362 Windows Device Association Service Elevation of Privilege Vulnerability
Windows Device Association Service Elevation of Privilege Vulnerability
Description: Concurrent execution using shared resource with improper synchronization ('race condition') in Windows Device Association Service allows an authorized attacker to elevate privileges locally.
FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability?
An attacker who succe
msrc
CVE-2026-24285HIGHCVSS 7.02026-03-10
CVE-2026-24285 [HIGH] CWE-416 Win32k Elevation of Privilege Vulnerability
Win32k Elevation of Privilege Vulnerability
Description: Use after free in Windows Win32K allows an authorized attacker to elevate privileges locally.
FAQ: What privileges could be gained by an attacker who successfully exploited the vulnerability?
An attacker who successfully exploited this vulnerability could gain administrator privileges.
FAQ: Is the Preview Pane an attack vector for this vulnerability?
No, the Previ
msrc
CVE-2026-23671HIGHCVSS 7.02026-03-10
CVE-2026-23671 [HIGH] CWE-362 Windows Bluetooth RFCOM Protocol Driver Elevation of Privilege Vulnerability
Windows Bluetooth RFCOM Protocol Driver Elevation of Privilege Vulnerability
Description: Concurrent execution using shared resource with improper synchronization ('race condition') in Windows Bluetooth RFCOM Protocol Driver allows an authorized attacker to elevate privileges locally.
FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vul
msrc
CVE-2026-26132HIGHCVSS 7.82026-03-10
CVE-2026-26132 [HIGH] CWE-416 Windows Kernel Elevation of Privilege Vulnerability
Windows Kernel Elevation of Privilege Vulnerability
Description: Use after free in Windows Kernel allows an authorized attacker to elevate privileges locally.
FAQ: What privileges could be gained by an attacker who successfully exploited the vulnerability?
An attacker who successfully exploited this vulnerability could gain administrator privileges.
Windows Kernel: Windows Kernel
Microsoft: Microsoft
Customer
msrc
CVE-2026-24292HIGHCVSS 7.82026-03-10
CVE-2026-24292 [HIGH] CWE-416 Windows Connected Devices Platform Service Elevation of Privilege Vulnerability
Windows Connected Devices Platform Service Elevation of Privilege Vulnerability
Description: Use after free in Connected Devices Platform Service (Cdpsvc) allows an authorized attacker to elevate privileges locally.
FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability?
An attacker who successfully exploited this vulnerability could gain SYST
msrc
CVE-2026-25170HIGHCVSS 7.02026-03-10
CVE-2026-25170 [HIGH] CWE-416 Windows Hyper-V Elevation of Privilege Vulnerability
Windows Hyper-V Elevation of Privilege Vulnerability
Description: Use after free in Windows Hyper-V allows an authorized attacker to elevate privileges locally.
FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability?
An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.
FAQ: According to the CVSS metric, the attack complexity is high (
msrc
CVE-2026-24283HIGHCVSS 8.82026-03-10
CVE-2026-24283 [HIGH] CWE-122 Multiple UNC Provider Kernel Driver Elevation of Privilege Vulnerability
Multiple UNC Provider Kernel Driver Elevation of Privilege Vulnerability
Description: Heap-based buffer overflow in Windows File Server allows an authorized attacker to elevate privileges locally.
FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability?
An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.
FAQ: Accor
msrc
CVE-2026-24293HIGHCVSS 7.82026-03-10
CVE-2026-24293 [HIGH] CWE-476 Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
Description: Null pointer dereference in Windows Ancillary Function Driver for WinSock allows an authorized attacker to elevate privileges locally.
FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability?
An attacker who successfully exploited this vulnerabili
msrc
CVE-2026-21248HIGHCVSS 7.32026-02-10
CVE-2026-21248 [HIGH] CWE-122 Windows Hyper-V Remote Code Execution Vulnerability
Windows Hyper-V Remote Code Execution Vulnerability
Description: Heap-based buffer overflow in Windows Hyper-V allows an authorized attacker to execute code locally.
FAQ: According to the CVSS metric, user interaction is required (UI:R) and privileges required is Low (PR:L). What does that mean for this vulnerability?
The file must be stored in a location that allows an attacker write access, enabling the file to
msrc
CVE-2026-21237HIGHCVSS 7.02026-02-10
CVE-2026-21237 [HIGH] CWE-362 Windows Subsystem for Linux Elevation of Privilege Vulnerability
Windows Subsystem for Linux Elevation of Privilege Vulnerability
Description: Concurrent execution using shared resource with improper synchronization ('race condition') in Windows Subsystem for Linux allows an authorized attacker to elevate privileges locally.
FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?
For an attacker to explo
msrc
CVE-2026-21255HIGHCVSS 8.82026-02-10
CVE-2026-21255 [HIGH] CWE-284 Windows Hyper-V Security Feature Bypass Vulnerability
Windows Hyper-V Security Feature Bypass Vulnerability
Description: Improper access control in Windows Hyper-V allows an authorized attacker to bypass a security feature locally.
FAQ: What kind of security feature could be bypassed by successfully exploiting this vulnerability?
An attacker who successfully exploited this vulnerability could bypass the Virtualization-based Security feature.
FAQ: How could an att
msrc
CVE-2026-21240HIGHCVSS 7.82026-02-10
CVE-2026-21240 [HIGH] CWE-367 Windows HTTP.sys Elevation of Privilege Vulnerability
Windows HTTP.sys Elevation of Privilege Vulnerability
Description: Time-of-check time-of-use (toctou) race condition in Windows HTTP.sys allows an authorized attacker to elevate privileges locally.
FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability?
An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.
Windows HTTP.sys: Windows HT
msrc
CVE-2026-21243HIGHCVSS 7.52026-02-10
CVE-2026-21243 [HIGH] CWE-476 Windows Lightweight Directory Access Protocol (LDAP) Denial of Service Vulnerability
Windows Lightweight Directory Access Protocol (LDAP) Denial of Service Vulnerability
Description: Null pointer dereference in Windows LDAP - Lightweight Directory Access Protocol allows an unauthorized attacker to deny service over a network.
Windows LDAP - Lightweight Directory Access Protocol: Windows LDAP - Lightweight Directory Access Protocol
Microsoft: Microsoft
Customer A
msrc
CVE-2026-21239HIGHCVSS 7.82026-02-10
CVE-2026-21239 [HIGH] CWE-122 Windows Kernel Elevation of Privilege Vulnerability
Windows Kernel Elevation of Privilege Vulnerability
Description: Heap-based buffer overflow in Windows Kernel allows an authorized attacker to elevate privileges locally.
FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability?
An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.
Windows Kernel: Windows Kernel
Microsoft: Microsoft
Cus
msrc
CVE-2026-21247HIGHCVSS 7.32026-02-10
CVE-2026-21247 [HIGH] CWE-20 Windows Hyper-V Remote Code Execution Vulnerability
Windows Hyper-V Remote Code Execution Vulnerability
Description: Improper input validation in Windows Hyper-V allows an authorized attacker to execute code locally.
FAQ: According to the CVSS metric, user interaction is required (UI:R) and privileges required is Low (PR:L). What does that mean for this vulnerability?
The file must be stored in a location that allows an attacker write access, enabling the file to b
msrc
CVE-2026-21245HIGHCVSS 7.82026-02-10
CVE-2026-21245 [HIGH] CWE-122 Windows Kernel Elevation of Privilege Vulnerability
Windows Kernel Elevation of Privilege Vulnerability
Description: Heap-based buffer overflow in Windows Kernel allows an authorized attacker to elevate privileges locally.
FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability?
An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.
Windows Kernel: Windows Kernel
Microsoft: Microsoft
Cus
msrc
1 / 31Next →