Msrc Windows Server 2025 vulnerabilities
604 known vulnerabilities affecting msrc/windows_server_2025.
Total CVEs
604
CISA KEV
14
actively exploited
Public exploits
9
Exploited in wild
2
Severity breakdown
CRITICAL7HIGH401MEDIUM192LOW4
Vulnerabilities
Page 26 of 31
CVE-2025-21281HIGHCVSS 7.82025-01-14
CVE-2025-21281 [HIGH] CWE-416 Microsoft COM for Windows Elevation of Privilege Vulnerability
Microsoft COM for Windows Elevation of Privilege Vulnerability
FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability?
An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.
Windows COM: Windows COM
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Elevation of Privilege
Exploit Status: Publicly Disclosed:No;Exploi
msrc
CVE-2025-21326HIGHCVSS 7.82025-01-14
CVE-2025-21326 [HIGH] CWE-843 Internet Explorer Remote Code Execution Vulnerability
Internet Explorer Remote Code Execution Vulnerability
FAQ: According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution?
The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally.
For example, when the score i
msrc
CVE-2025-21293HIGHCVSS 8.8PoC2025-01-14
CVE-2025-21293 [HIGH] CWE-284 Active Directory Domain Services Elevation of Privilege Vulnerability
Active Directory Domain Services Elevation of Privilege Vulnerability
FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability?
An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.
FAQ: How could an attacker exploit this vulnerability?
To exploit this vulnerability, an attacker would first have to log on to the system.
msrc
CVE-2025-21299HIGHCVSS 7.12025-01-14
CVE-2025-21299 [HIGH] CWE-922 Windows Kerberos Security Feature Bypass Vulnerability
Windows Kerberos Security Feature Bypass Vulnerability
FAQ: Are there any additional steps that I need to follow to be protected from this vulnerability?
The changes to address this vulnerability updated Virtual Secure Mode components. The policy described in Guidance for blocking rollback of Virtualization-based Security (VBS) related security updates has been updated to account for the latest changes. If you
msrc
CVE-2025-21239HIGHCVSS 8.82025-01-14
CVE-2025-21239 [HIGH] CWE-122 Windows Telephony Service Remote Code Execution Vulnerability
Windows Telephony Service Remote Code Execution Vulnerability
FAQ: How could an attacker exploit this vulnerability?
An attacker could exploit this vulnerability by tricking a user into sending a request to a malicious server. This could result in the server returning malicious data that might cause arbitrary code execution on the user's system.
Windows Telephony Service: Windows Telephony Service
Micr
msrc
CVE-2025-21315HIGHCVSS 7.82025-01-14
CVE-2025-21315 [HIGH] CWE-416 Microsoft Brokering File System Elevation of Privilege Vulnerability
Microsoft Brokering File System Elevation of Privilege Vulnerability
FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?
Successful exploitation of this vulnerability requires an attacker to win a race condition.
FAQ: What privileges could be gained by an attacker who successfully exploited the vulnerability?
An attacker who success
msrc
CVE-2025-21224HIGHCVSS 8.12025-01-14
CVE-2025-21224 [HIGH] CWE-591 Windows Line Printer Daemon (LPD) Service Remote Code Execution Vulnerability
Windows Line Printer Daemon (LPD) Service Remote Code Execution Vulnerability
FAQ: How could an attacker exploit this vulnerability?
An unauthenticated attacker could send a specially crafted print task to a shared vulnerable Windows Line Printer Daemon (LPD) service across a network. Successful exploitation could result in remote code execution on the server.
FAQ: According to the CVSS
msrc
CVE-2025-21234HIGHCVSS 7.82025-01-14
CVE-2025-21234 [HIGH] CWE-20 Windows PrintWorkflowUserSvc Elevation of Privilege Vulnerability
Windows PrintWorkflowUserSvc Elevation of Privilege Vulnerability
FAQ: What privileges could be gained by an attacker who successfully exploited the vulnerability?
An attacker could use this vulnerability to elevate privileges from a Low Integrity Level in a contained ("sandboxed") execution environment to a Medium Integrity Level.
Please refer to AppContainer isolation and Mandatory Integrity Control
msrc
CVE-2025-21235HIGHCVSS 7.82025-01-14
CVE-2025-21235 [HIGH] CWE-20 Windows PrintWorkflowUserSvc Elevation of Privilege Vulnerability
Windows PrintWorkflowUserSvc Elevation of Privilege Vulnerability
FAQ: What privileges could be gained by an attacker who successfully exploited the vulnerability?
An attacker could use this vulnerability to elevate privileges from a Low Integrity Level in a contained ("sandboxed") execution environment to a Medium Integrity Level.
Please refer to AppContainer isolation and Mandatory Integrity Control
msrc
CVE-2025-21207HIGHCVSS 7.52025-01-14
CVE-2025-21207 [HIGH] CWE-400 Windows Connected Devices Platform Service (Cdpsvc) Denial of Service Vulnerability
Windows Connected Devices Platform Service (Cdpsvc) Denial of Service Vulnerability
FAQ: According to the CVSS metrics, successful exploitation of this vulnerability could lead to major loss of availability (A:H). What does that mean for this vulnerability?
An attacker can send specially crafted packets which could affect availability of the service and result in Denial of Service (
msrc
CVE-2025-21325HIGHCVSS 7.82025-01-14
CVE-2025-21325 [HIGH] CWE-732 Windows Secure Kernel Mode Elevation of Privilege Vulnerability
Windows Secure Kernel Mode Elevation of Privilege Vulnerability
FAQ: What architecture(s) are impacted by this vulnerability?
This vulnerability impacts ARM64 only.
FAQ: How could an attacker exploit this vulnerability and what privileges could an attacker gain?
An authenticated attacker could escalate privileges to Secure Kernel by overwriting the page table data meant for the kernel.
Windows Secure
msrc
CVE-2025-21309HIGHCVSS 8.12025-01-14
CVE-2025-21309 [HIGH] CWE-591 Windows Remote Desktop Services Remote Code Execution Vulnerability
Windows Remote Desktop Services Remote Code Execution Vulnerability
FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?
Successful exploitation of this vulnerability requires an attacker to win a race condition.
FAQ: How could an attacker exploit this vulnerability?
An attacker could successfully exploit this vulnerability by attempt
msrc
CVE-2025-21297HIGHCVSS 8.12025-01-14
CVE-2025-21297 [HIGH] CWE-416 Windows Remote Desktop Services Remote Code Execution Vulnerability
Windows Remote Desktop Services Remote Code Execution Vulnerability
FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?
Successful exploitation of this vulnerability requires an attacker to win a race condition.
FAQ: How could an attacker exploit this vulnerability?
An attacker could successfully exploit this vulnerability by attempt
msrc
CVE-2025-21333HIGHCVSS 7.8KEVPoC2025-01-14
CVE-2025-21333 [HIGH] CWE-122 Windows Hyper-V NT Kernel Integration VSP Elevation of Privilege Vulnerability
Windows Hyper-V NT Kernel Integration VSP Elevation of Privilege Vulnerability
FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability?
An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.
FAQ: Does this vulnerability exist in the Hyper-V server?
No, the Hyper-V NT Kernel Integration Virtual Service Provider (V
msrc
CVE-2025-21335HIGHCVSS 7.8KEV2025-01-14
CVE-2025-21335 [HIGH] CWE-416 Windows Hyper-V NT Kernel Integration VSP Elevation of Privilege Vulnerability
Windows Hyper-V NT Kernel Integration VSP Elevation of Privilege Vulnerability
FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability?
An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.
FAQ: Does this vulnerability exist in the Hyper-V server?
No, the Hyper-V NT Kernel Integration Virtual Service Provider (V
msrc
CVE-2025-21378HIGHCVSS 7.82025-01-14
CVE-2025-21378 [HIGH] CWE-122 Windows CSC Service Elevation of Privilege Vulnerability
Windows CSC Service Elevation of Privilege Vulnerability
FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability?
An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.
Windows Client-Side Caching (CSC) Service: Windows Client-Side Caching (CSC) Service
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Elevation of Privile
msrc
CVE-2025-21382HIGHCVSS 7.82025-01-14
CVE-2025-21382 [HIGH] CWE-190 Windows Graphics Component Elevation of Privilege Vulnerability
Windows Graphics Component Elevation of Privilege Vulnerability
FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability?
An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.
Microsoft Graphics Component: Microsoft Graphics Component
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Elevation of Privilege
Exploit
msrc
CVE-2025-21275HIGHCVSS 7.82025-01-14
CVE-2025-21275 [HIGH] CWE-285 Windows App Package Installer Elevation of Privilege Vulnerability
Windows App Package Installer Elevation of Privilege Vulnerability
FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability?
An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.
Windows Installer: Windows Installer
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Elevation of Privilege
Exploit Status: Publicly
msrc
CVE-2025-21334HIGHCVSS 7.8KEV2025-01-14
CVE-2025-21334 [HIGH] CWE-416 Windows Hyper-V NT Kernel Integration VSP Elevation of Privilege Vulnerability
Windows Hyper-V NT Kernel Integration VSP Elevation of Privilege Vulnerability
FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability?
An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.
FAQ: Does this vulnerability exist in the Hyper-V server?
No, the Hyper-V NT Kernel Integration Virtual Service Provider (V
msrc
CVE-2025-21372HIGHCVSS 7.82025-01-14
CVE-2025-21372 [HIGH] CWE-416 Microsoft Brokering File System Elevation of Privilege Vulnerability
Microsoft Brokering File System Elevation of Privilege Vulnerability
FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?
Successful exploitation of this vulnerability requires an attacker to win a race condition.
FAQ: According to the CVSS metric, successful exploitation could lead to a scope change (S:C). What does this mean for th
msrc