Msrc Windows Server 2025 vulnerabilities
604 known vulnerabilities affecting msrc/windows_server_2025.
Total CVEs
604
CISA KEV
14
actively exploited
Public exploits
9
Exploited in wild
2
Severity breakdown
CRITICAL7HIGH401MEDIUM192LOW4
Vulnerabilities
Page 3 of 31
CVE-2026-20856HIGHCVSS 8.12026-01-13
CVE-2026-20856 [HIGH] CWE-20 Windows Server Update Service (WSUS) Remote Code Execution Vulnerability
Windows Server Update Service (WSUS) Remote Code Execution Vulnerability
Description: Improper input validation in Windows Server Update Service allows an unauthorized attacker to execute code over a network.
FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?
The attacker must inject themselves into the logical network path betw
msrc
CVE-2026-20852HIGHCVSS 7.72026-01-13
CVE-2026-20852 [HIGH] CWE-266 Windows Hello Tampering Vulnerability
Windows Hello Tampering Vulnerability
Description: Incorrect privilege assignment in Windows Hello allows an unauthorized attacker to perform tampering locally.
Windows Hello: Windows Hello
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Tampering
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely
Reference: https://catalog.update.microsoft.com/v7/site/Search.asp
msrc
CVE-2026-20836HIGHCVSS 7.02026-01-13
CVE-2026-20836 [HIGH] CWE-362 DirectX Graphics Kernel Elevation of Privilege Vulnerability
DirectX Graphics Kernel Elevation of Privilege Vulnerability
Description: Concurrent execution using shared resource with improper synchronization ('race condition') in Graphics Kernel allows an authorized attacker to elevate privileges locally.
FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability?
An attacker who successfully exploited this vulnerability coul
msrc
CVE-2026-20866HIGHCVSS 7.82026-01-13
CVE-2026-20866 [HIGH] CWE-362 Windows Management Services Elevation of Privilege Vulnerability
Windows Management Services Elevation of Privilege Vulnerability
Description: Concurrent execution using shared resource with improper synchronization ('race condition') in Windows Management Services allows an authorized attacker to elevate privileges locally.
FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?
Successful exploitation
msrc
CVE-2026-20844HIGHCVSS 7.42026-01-13
CVE-2026-20844 [HIGH] CWE-416 Windows Clipboard Server Elevation of Privilege Vulnerability
Windows Clipboard Server Elevation of Privilege Vulnerability
Description: Use after free in Windows Clipboard Server allows an unauthorized attacker to elevate privileges locally.
FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability?
An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.
FAQ: According to the CVSS metric, th
msrc
CVE-2026-20842HIGHCVSS 7.02026-01-13
CVE-2026-20842 [HIGH] CWE-416 Microsoft DWM Core Library Elevation of Privilege Vulnerability
Microsoft DWM Core Library Elevation of Privilege Vulnerability
Description: Use after free in Windows DWM allows an authorized attacker to elevate privileges locally.
FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?
For an attacker to exploit this vulnerability, they would need to have knowledge of a specific operation that triggers
msrc
CVE-2026-20858HIGHCVSS 7.82026-01-13
CVE-2026-20858 [HIGH] CWE-416 Windows Management Services Elevation of Privilege Vulnerability
Windows Management Services Elevation of Privilege Vulnerability
Description: Use after free in Windows Management Services allows an authorized attacker to elevate privileges locally.
FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?
Successful exploitation of this vulnerability requires an attacker to win a race condition.
FAQ: Acc
msrc
CVE-2026-20854HIGHCVSS 7.52026-01-13
CVE-2026-20854 [HIGH] CWE-416 Windows Local Security Authority Subsystem Service (LSASS) Remote Code Execution Vulnerability
Windows Local Security Authority Subsystem Service (LSASS) Remote Code Execution Vulnerability
Description: Use after free in Windows Local Security Authority Subsystem Service (LSASS) allows an authorized attacker to execute code over a network.
FAQ: How could an attacker exploit this vulnerability?
An attacker with the ability to modify certain directory attributes cou
msrc
CVE-2026-20941HIGHCVSS 7.82026-01-13
CVE-2026-20941 [HIGH] CWE-59 Host Process for Windows Tasks Elevation of Privilege Vulnerability
Host Process for Windows Tasks Elevation of Privilege Vulnerability
Description: Improper link resolution before file access ('link following') in Host Process for Windows Tasks allows an authorized attacker to elevate privileges locally.
FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability?
An attacker who successfully exploited this vulnerability could
msrc
CVE-2026-20871HIGHCVSS 7.82026-01-13
CVE-2026-20871 [HIGH] CWE-416 Desktop Window Manager Elevation of Privilege Vulnerability
Desktop Window Manager Elevation of Privilege Vulnerability
Description: Use after free in Desktop Windows Manager allows an authorized attacker to elevate privileges locally.
FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability?
An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.
Desktop Window Manager: Desktop Window Manag
msrc
CVE-2026-20934HIGHCVSS 7.52026-01-13
CVE-2026-20934 [HIGH] CWE-362 Windows SMB Server Elevation of Privilege Vulnerability
Windows SMB Server Elevation of Privilege Vulnerability
Description: Concurrent execution using shared resource with improper synchronization ('race condition') in Windows SMB Server allows an authorized attacker to elevate privileges over a network.
FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?
Successful exploitation of this vulnerabilit
msrc
CVE-2026-20817HIGHCVSS 7.82026-01-13
CVE-2026-20817 [HIGH] CWE-280 Windows Error Reporting Service Elevation of Privilege Vulnerability
Windows Error Reporting Service Elevation of Privilege Vulnerability
Description: Improper handling of insufficient permissions or privileges in Windows Error Reporting allows an authorized attacker to elevate privileges locally.
FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability?
An attacker who successfully exploited this vulnerability could gain S
msrc
CVE-2026-20874HIGHCVSS 7.82026-01-13
CVE-2026-20874 [HIGH] CWE-362 Windows Management Services Elevation of Privilege Vulnerability
Windows Management Services Elevation of Privilege Vulnerability
Description: Concurrent execution using shared resource with improper synchronization ('race condition') in Windows Management Services allows an authorized attacker to elevate privileges locally.
FAQ: According to the CVSS metric, successful exploitation could lead to a scope change (S:C). What does this mean for this vulnerability?
In
msrc
CVE-2026-20811HIGHCVSS 7.82026-01-13
CVE-2026-20811 [HIGH] CWE-843 Win32k Elevation of Privilege Vulnerability
Win32k Elevation of Privilege Vulnerability
Description: Access of resource using incompatible type ('type confusion') in Windows Win32K - ICOMP allows an authorized attacker to elevate privileges locally.
FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability?
An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.
Windows Win32K - ICOMP: Window
msrc
CVE-2026-20877HIGHCVSS 7.82026-01-13
CVE-2026-20877 [HIGH] CWE-416 Windows Management Services Elevation of Privilege Vulnerability
Windows Management Services Elevation of Privilege Vulnerability
Description: Use after free in Windows Management Services allows an authorized attacker to elevate privileges locally.
FAQ: According to the CVSS metric, successful exploitation could lead to a scope change (S:C). What does this mean for this vulnerability?
In this case, a successful attack could be performed from a low privilege AppCo
msrc
CVE-2026-20822HIGHCVSS 7.82026-01-13
CVE-2026-20822 [HIGH] CWE-416 Windows Graphics Component Elevation of Privilege Vulnerability
Windows Graphics Component Elevation of Privilege Vulnerability
Description: Use after free in Microsoft Graphics Component allows an authorized attacker to elevate privileges locally.
FAQ: According to the CVSS metric, a successful exploitation could lead to a scope change (S:C). What does this mean for this vulnerability?
In a GPU paravirtualization scenario, an attacker who successfully exploited t
msrc
CVE-2026-0386HIGHCVSS 7.52026-01-13
CVE-2026-0386 [HIGH] CWE-284 Windows Deployment Services Remote Code Execution Vulnerability
Windows Deployment Services Remote Code Execution Vulnerability
Description: Improper access control in Windows Deployment Services allows an unauthorized attacker to execute code over an adjacent network.
FAQ: Are there additional steps I need to take to be protected from this vulnerability?
Admins should take the following steps to be protected from CVE-2026-0386:
Audit existing WDS usage and identi
msrc
CVE-2026-20926HIGHCVSS 7.52026-01-13
CVE-2026-20926 [HIGH] CWE-362 Windows SMB Server Elevation of Privilege Vulnerability
Windows SMB Server Elevation of Privilege Vulnerability
Description: Concurrent execution using shared resource with improper synchronization ('race condition') in Windows SMB Server allows an authorized attacker to elevate privileges over a network.
FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?
Successful exploitation of this vulnerabilit
msrc
CVE-2026-20867HIGHCVSS 7.82026-01-13
CVE-2026-20867 [HIGH] CWE-362 Windows Management Services Elevation of Privilege Vulnerability
Windows Management Services Elevation of Privilege Vulnerability
Description: Concurrent execution using shared resource with improper synchronization ('race condition') in Windows Management Services allows an authorized attacker to elevate privileges locally.
FAQ: According to the CVSS metric, successful exploitation could lead to a scope change (S:C). What does this mean for this vulnerability?
In
msrc
CVE-2026-20808HIGHCVSS 7.02026-01-13
CVE-2026-20808 [HIGH] CWE-362 Windows File Explorer Elevation of Privilege Vulnerability
Windows File Explorer Elevation of Privilege Vulnerability
Description: Concurrent execution using shared resource with improper synchronization ('race condition') in Printer Association Object allows an authorized attacker to elevate privileges locally.
FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?
Successful exploitation of this vulne
msrc