Msrc Windows Server 2025 vulnerabilities

604 known vulnerabilities affecting msrc/windows_server_2025.

Total CVEs
604
CISA KEV
14
actively exploited
Public exploits
9
Exploited in wild
2
Severity breakdown
CRITICAL7HIGH401MEDIUM192LOW4

Vulnerabilities

Page 26 of 31
CVE-2025-21281HIGHCVSS 7.82025-01-14
CVE-2025-21281 [HIGH] CWE-416 Microsoft COM for Windows Elevation of Privilege Vulnerability Microsoft COM for Windows Elevation of Privilege Vulnerability FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. Windows COM: Windows COM Microsoft: Microsoft Customer Action Required: Yes Impact: Elevation of Privilege Exploit Status: Publicly Disclosed:No;Exploi
msrc
CVE-2025-21326HIGHCVSS 7.82025-01-14
CVE-2025-21326 [HIGH] CWE-843 Internet Explorer Remote Code Execution Vulnerability Internet Explorer Remote Code Execution Vulnerability FAQ: According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution? The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally. For example, when the score i
msrc
CVE-2025-21293HIGHCVSS 8.8PoC2025-01-14
CVE-2025-21293 [HIGH] CWE-284 Active Directory Domain Services Elevation of Privilege Vulnerability Active Directory Domain Services Elevation of Privilege Vulnerability FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. FAQ: How could an attacker exploit this vulnerability? To exploit this vulnerability, an attacker would first have to log on to the system.
msrc
CVE-2025-21299HIGHCVSS 7.12025-01-14
CVE-2025-21299 [HIGH] CWE-922 Windows Kerberos Security Feature Bypass Vulnerability Windows Kerberos Security Feature Bypass Vulnerability FAQ: Are there any additional steps that I need to follow to be protected from this vulnerability? The changes to address this vulnerability updated Virtual Secure Mode components. The policy described in Guidance for blocking rollback of Virtualization-based Security (VBS) related security updates has been updated to account for the latest changes. If you
msrc
CVE-2025-21239HIGHCVSS 8.82025-01-14
CVE-2025-21239 [HIGH] CWE-122 Windows Telephony Service Remote Code Execution Vulnerability Windows Telephony Service Remote Code Execution Vulnerability FAQ: How could an attacker exploit this vulnerability? An attacker could exploit this vulnerability by tricking a user into sending a request to a malicious server. This could result in the server returning malicious data that might cause arbitrary code execution on the user's system. Windows Telephony Service: Windows Telephony Service Micr
msrc
CVE-2025-21315HIGHCVSS 7.82025-01-14
CVE-2025-21315 [HIGH] CWE-416 Microsoft Brokering File System Elevation of Privilege Vulnerability Microsoft Brokering File System Elevation of Privilege Vulnerability FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability? Successful exploitation of this vulnerability requires an attacker to win a race condition. FAQ: What privileges could be gained by an attacker who successfully exploited the vulnerability? An attacker who success
msrc
CVE-2025-21224HIGHCVSS 8.12025-01-14
CVE-2025-21224 [HIGH] CWE-591 Windows Line Printer Daemon (LPD) Service Remote Code Execution Vulnerability Windows Line Printer Daemon (LPD) Service Remote Code Execution Vulnerability FAQ: How could an attacker exploit this vulnerability? An unauthenticated attacker could send a specially crafted print task to a shared vulnerable Windows Line Printer Daemon (LPD) service across a network. Successful exploitation could result in remote code execution on the server. FAQ: According to the CVSS
msrc
CVE-2025-21234HIGHCVSS 7.82025-01-14
CVE-2025-21234 [HIGH] CWE-20 Windows PrintWorkflowUserSvc Elevation of Privilege Vulnerability Windows PrintWorkflowUserSvc Elevation of Privilege Vulnerability FAQ: What privileges could be gained by an attacker who successfully exploited the vulnerability? An attacker could use this vulnerability to elevate privileges from a Low Integrity Level in a contained ("sandboxed") execution environment to a Medium Integrity Level. Please refer to AppContainer isolation and Mandatory Integrity Control
msrc
CVE-2025-21235HIGHCVSS 7.82025-01-14
CVE-2025-21235 [HIGH] CWE-20 Windows PrintWorkflowUserSvc Elevation of Privilege Vulnerability Windows PrintWorkflowUserSvc Elevation of Privilege Vulnerability FAQ: What privileges could be gained by an attacker who successfully exploited the vulnerability? An attacker could use this vulnerability to elevate privileges from a Low Integrity Level in a contained ("sandboxed") execution environment to a Medium Integrity Level. Please refer to AppContainer isolation and Mandatory Integrity Control
msrc
CVE-2025-21207HIGHCVSS 7.52025-01-14
CVE-2025-21207 [HIGH] CWE-400 Windows Connected Devices Platform Service (Cdpsvc) Denial of Service Vulnerability Windows Connected Devices Platform Service (Cdpsvc) Denial of Service Vulnerability FAQ: According to the CVSS metrics, successful exploitation of this vulnerability could lead to major loss of availability (A:H). What does that mean for this vulnerability? An attacker can send specially crafted packets which could affect availability of the service and result in Denial of Service (
msrc
CVE-2025-21325HIGHCVSS 7.82025-01-14
CVE-2025-21325 [HIGH] CWE-732 Windows Secure Kernel Mode Elevation of Privilege Vulnerability Windows Secure Kernel Mode Elevation of Privilege Vulnerability FAQ: What architecture(s) are impacted by this vulnerability? This vulnerability impacts ARM64 only. FAQ: How could an attacker exploit this vulnerability and what privileges could an attacker gain? An authenticated attacker could escalate privileges to Secure Kernel by overwriting the page table data meant for the kernel. Windows Secure
msrc
CVE-2025-21309HIGHCVSS 8.12025-01-14
CVE-2025-21309 [HIGH] CWE-591 Windows Remote Desktop Services Remote Code Execution Vulnerability Windows Remote Desktop Services Remote Code Execution Vulnerability FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability? Successful exploitation of this vulnerability requires an attacker to win a race condition. FAQ: How could an attacker exploit this vulnerability? An attacker could successfully exploit this vulnerability by attempt
msrc
CVE-2025-21297HIGHCVSS 8.12025-01-14
CVE-2025-21297 [HIGH] CWE-416 Windows Remote Desktop Services Remote Code Execution Vulnerability Windows Remote Desktop Services Remote Code Execution Vulnerability FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability? Successful exploitation of this vulnerability requires an attacker to win a race condition. FAQ: How could an attacker exploit this vulnerability? An attacker could successfully exploit this vulnerability by attempt
msrc
CVE-2025-21333HIGHCVSS 7.8KEVPoC2025-01-14
CVE-2025-21333 [HIGH] CWE-122 Windows Hyper-V NT Kernel Integration VSP Elevation of Privilege Vulnerability Windows Hyper-V NT Kernel Integration VSP Elevation of Privilege Vulnerability FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. FAQ: Does this vulnerability exist in the Hyper-V server? No, the Hyper-V NT Kernel Integration Virtual Service Provider (V
msrc
CVE-2025-21335HIGHCVSS 7.8KEV2025-01-14
CVE-2025-21335 [HIGH] CWE-416 Windows Hyper-V NT Kernel Integration VSP Elevation of Privilege Vulnerability Windows Hyper-V NT Kernel Integration VSP Elevation of Privilege Vulnerability FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. FAQ: Does this vulnerability exist in the Hyper-V server? No, the Hyper-V NT Kernel Integration Virtual Service Provider (V
msrc
CVE-2025-21378HIGHCVSS 7.82025-01-14
CVE-2025-21378 [HIGH] CWE-122 Windows CSC Service Elevation of Privilege Vulnerability Windows CSC Service Elevation of Privilege Vulnerability FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. Windows Client-Side Caching (CSC) Service: Windows Client-Side Caching (CSC) Service Microsoft: Microsoft Customer Action Required: Yes Impact: Elevation of Privile
msrc
CVE-2025-21382HIGHCVSS 7.82025-01-14
CVE-2025-21382 [HIGH] CWE-190 Windows Graphics Component Elevation of Privilege Vulnerability Windows Graphics Component Elevation of Privilege Vulnerability FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. Microsoft Graphics Component: Microsoft Graphics Component Microsoft: Microsoft Customer Action Required: Yes Impact: Elevation of Privilege Exploit
msrc
CVE-2025-21275HIGHCVSS 7.82025-01-14
CVE-2025-21275 [HIGH] CWE-285 Windows App Package Installer Elevation of Privilege Vulnerability Windows App Package Installer Elevation of Privilege Vulnerability FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. Windows Installer: Windows Installer Microsoft: Microsoft Customer Action Required: Yes Impact: Elevation of Privilege Exploit Status: Publicly
msrc
CVE-2025-21334HIGHCVSS 7.8KEV2025-01-14
CVE-2025-21334 [HIGH] CWE-416 Windows Hyper-V NT Kernel Integration VSP Elevation of Privilege Vulnerability Windows Hyper-V NT Kernel Integration VSP Elevation of Privilege Vulnerability FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. FAQ: Does this vulnerability exist in the Hyper-V server? No, the Hyper-V NT Kernel Integration Virtual Service Provider (V
msrc
CVE-2025-21372HIGHCVSS 7.82025-01-14
CVE-2025-21372 [HIGH] CWE-416 Microsoft Brokering File System Elevation of Privilege Vulnerability Microsoft Brokering File System Elevation of Privilege Vulnerability FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability? Successful exploitation of this vulnerability requires an attacker to win a race condition. FAQ: According to the CVSS metric, successful exploitation could lead to a scope change (S:C). What does this mean for th
msrc
Msrc Windows Server 2025 vulnerabilities | cvebase