Msrc Windows Server 2025 vulnerabilities
604 known vulnerabilities affecting msrc/windows_server_2025.
Total CVEs
604
CISA KEV
14
actively exploited
Public exploits
9
Exploited in wild
2
Severity breakdown
CRITICAL7HIGH401MEDIUM192LOW4
Vulnerabilities
Page 18 of 31
CVE-2025-49725HIGHCVSS 7.82025-07-08
CVE-2025-49725 [HIGH] CWE-416 Windows Notification Elevation of Privilege Vulnerability
Windows Notification Elevation of Privilege Vulnerability
Description: Use after free in Windows Notification allows an authorized attacker to elevate privileges locally.
FAQ: What privileges could be gained by an attacker who successfully exploited the vulnerability?
An attacker who successfully exploited this vulnerability could potentially gain the ability to crash the system by exploiting the use-after-
msrc
CVE-2025-49676HIGHCVSS 8.82025-07-08
CVE-2025-49676 [HIGH] CWE-122 Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
Description: Heap-based buffer overflow in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to execute code over a network.
FAQ: According to the CVSS metric, the attack vector is network (AV:N), user interaction is required (UI:R), and privileges required are none
msrc
CVE-2025-49673HIGHCVSS 8.82025-07-08
CVE-2025-49673 [HIGH] CWE-122 Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
Description: Heap-based buffer overflow in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to execute code over a network.
FAQ: According to the CVSS metric, the attack vector is network (AV:N), user interaction is required (UI:R), and privileges required are none
msrc
CVE-2025-49663HIGHCVSS 8.82025-07-08
CVE-2025-49663 [HIGH] CWE-122 Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
Description: Heap-based buffer overflow in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to execute code over a network.
FAQ: According to the CVSS metric, the attack vector is network (AV:N), user interaction is required (UI:R), and privileges required are none
msrc
CVE-2025-33054HIGHCVSS 8.12025-07-08
CVE-2025-33054 [HIGH] CWE-357 Remote Desktop Spoofing Vulnerability
Remote Desktop Spoofing Vulnerability
Description: Insufficient UI warning of dangerous operations in Remote Desktop Client allows an unauthorized attacker to perform spoofing over a network.
FAQ: According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?
An attacker must trick the user into interacting with a spoofed WebAuthn prompt and entering their credentials.
FAQ: Acco
msrc
CVE-2025-47991HIGHCVSS 7.82025-07-08
CVE-2025-47991 [HIGH] CWE-416 Windows Input Method Editor (IME) Elevation of Privilege Vulnerability
Windows Input Method Editor (IME) Elevation of Privilege Vulnerability
Description: Use after free in Microsoft Input Method Editor (IME) allows an authorized attacker to elevate privileges locally.
FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?
Successful exploitation of this vulnerability requires an attacker to win a race
msrc
CVE-2025-49657HIGHCVSS 8.82025-07-08
CVE-2025-49657 [HIGH] CWE-122 Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
Description: Heap-based buffer overflow in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to execute code over a network.
FAQ: According to the CVSS metric, the attack vector is network (AV:N), user interaction is required (UI:R), and privileges required are none
msrc
CVE-2025-49733HIGHCVSS 7.82025-07-08
CVE-2025-49733 [HIGH] CWE-416 Win32k Elevation of Privilege Vulnerability
Win32k Elevation of Privilege Vulnerability
Description: Use after free in Windows Win32K - ICOMP allows an authorized attacker to elevate privileges locally.
FAQ: What privileges could be gained by an attacker who successfully exploited the vulnerability?
A local, authenticated attacker could gain elevated local system or administrator privileges through a vulnerability in the Win32k.sys driver.
Windows Win32K - ICOMP:
msrc
CVE-2025-49744HIGHCVSS 7.0PoC2025-07-08
CVE-2025-49744 [HIGH] CWE-122 Windows Graphics Component Elevation of Privilege Vulnerability
Windows Graphics Component Elevation of Privilege Vulnerability
Description: Heap-based buffer overflow in Microsoft Graphics Component allows an authorized attacker to elevate privileges locally.
FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?
To successfully exploit this vulnerability, an attacker would need to gain elevated privil
msrc
CVE-2025-49688HIGHCVSS 8.82025-07-08
CVE-2025-49688 [HIGH] CWE-415 Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
Description: Double free in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to execute code over a network.
FAQ: According to the CVSS metric, the attack vector is network (AV:N), user interaction is required (UI:R), and privileges required are none (PR:N). What do
msrc
CVE-2025-49691HIGHCVSS 8.02025-07-08
CVE-2025-49691 [HIGH] CWE-122 Windows Miracast Wireless Display Remote Code Execution Vulnerability
Windows Miracast Wireless Display Remote Code Execution Vulnerability
Description: Heap-based buffer overflow in Windows Media allows an unauthorized attacker to execute code over an adjacent network.
FAQ: How could an attacker exploit this vulnerability?
An unauthenticated attacker could project to a vulnerable system on the same wireless network that was configured to allow "Projecting to this
msrc
CVE-2025-48000HIGHCVSS 7.82025-07-08
CVE-2025-48000 [HIGH] CWE-416 Windows Connected Devices Platform Service Elevation of Privilege Vulnerability
Windows Connected Devices Platform Service Elevation of Privilege Vulnerability
Description: Use after free in Windows Connected Devices Platform Service allows an authorized attacker to elevate privileges locally.
FAQ: What privileges could be gained by an attacker who successfully exploited the vulnerability?
An attacker could use this vulnerability to elevate privileges from Medium
msrc
CVE-2025-49670MEDIUMCVSS 6.52025-07-08
CVE-2025-49670 [MEDIUM] CWE-122 Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
Description: Heap-based buffer overflow in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to execute code over a network.
FAQ: According to the CVSS metric, the attack vector is network (AV:N), user interaction is required (UI:R), and privileges required are non
msrc
CVE-2025-48809MEDIUMCVSS 5.52025-07-08
CVE-2025-48809 [MEDIUM] CWE-1037 Windows Secure Kernel Mode Information Disclosure Vulnerability
Windows Secure Kernel Mode Information Disclosure Vulnerability
Description: Processor optimization removal or modification of security-critical code in Windows Kernel allows an authorized attacker to disclose information locally.
FAQ: What type of information could be disclosed by this vulnerability?
Exploiting this vulnerability could allow the disclosure of certain kernel memory content.
Window
msrc
CVE-2025-48803MEDIUMCVSS 6.72025-07-08
CVE-2025-48803 [MEDIUM] CWE-353 Windows Virtualization-Based Security (VBS) Elevation of Privilege Vulnerability
Windows Virtualization-Based Security (VBS) Elevation of Privilege Vulnerability
Description: Missing support for integrity check in Windows Virtualization-Based Security (VBS) Enclave allows an authorized attacker to elevate privileges locally.
FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability?
An attacker who successfully exploited t
msrc
CVE-2025-26636MEDIUMCVSS 5.52025-07-08
CVE-2025-26636 [MEDIUM] CWE-1037 Windows Kernel Information Disclosure Vulnerability
Windows Kernel Information Disclosure Vulnerability
Description: Processor optimization removal or modification of security-critical code in Windows Kernel allows an authorized attacker to disclose information locally.
FAQ: What type of information could be disclosed by this vulnerability?
Exploiting this vulnerability could allow the disclosure of certain kernel memory content.
Windows Kernel: Windows Kernel
msrc
CVE-2025-49671MEDIUMCVSS 6.52025-07-08
CVE-2025-49671 [MEDIUM] CWE-200 Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability
Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability
Description: Exposure of sensitive information to an unauthorized actor in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to disclose information over a network.
FAQ: What type of information could be disclosed by this vulnerability?
An attacker who successful
msrc
CVE-2025-48810MEDIUMCVSS 5.52025-07-08
CVE-2025-48810 [MEDIUM] CWE-1037 Windows Secure Kernel Mode Information Disclosure Vulnerability
Windows Secure Kernel Mode Information Disclosure Vulnerability
Description: Processor optimization removal or modification of security-critical code in Windows Secure Kernel Mode allows an authorized attacker to disclose information locally.
FAQ: What type of information could be disclosed by this vulnerability?
Exploiting this vulnerability could allow the disclosure of certain kernel memory cont
msrc
CVE-2025-49681MEDIUMCVSS 6.52025-07-08
CVE-2025-49681 [MEDIUM] CWE-125 Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability
Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability
Description: Out-of-bounds read in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to disclose information over a network.
FAQ: According to the CVSS metric, the attack vector is network (AV:N), user interaction is required (UI:R), and privileges required are n
msrc
CVE-2024-36350MEDIUMCVSS 5.62025-07-08
CVE-2024-36350 [MEDIUM] AMD: CVE-2024-36350 Transient Scheduler Attack in Store Queue
AMD: CVE-2024-36350 Transient Scheduler Attack in Store Queue
Description: The vulnerability assigned to this CVE is in certain processor models offered by AMD. The mitigation for this vulnerability requires a Windows update. This CVE is being documented in the Security Update Guide to announce that the latest builds of Windows enable the mitigation and provide protection against the vulnerability.
Please see
msrc