Msrc Windows Server 2025 vulnerabilities

604 known vulnerabilities affecting msrc/windows_server_2025.

Total CVEs
604
CISA KEV
14
actively exploited
Public exploits
9
Exploited in wild
2
Severity breakdown
CRITICAL7HIGH401MEDIUM192LOW4

Vulnerabilities

Page 3 of 31
CVE-2026-20856HIGHCVSS 8.12026-01-13
CVE-2026-20856 [HIGH] CWE-20 Windows Server Update Service (WSUS) Remote Code Execution Vulnerability Windows Server Update Service (WSUS) Remote Code Execution Vulnerability Description: Improper input validation in Windows Server Update Service allows an unauthorized attacker to execute code over a network. FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability? The attacker must inject themselves into the logical network path betw
msrc
CVE-2026-20852HIGHCVSS 7.72026-01-13
CVE-2026-20852 [HIGH] CWE-266 Windows Hello Tampering Vulnerability Windows Hello Tampering Vulnerability Description: Incorrect privilege assignment in Windows Hello allows an unauthorized attacker to perform tampering locally. Windows Hello: Windows Hello Microsoft: Microsoft Customer Action Required: Yes Impact: Tampering Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely Reference: https://catalog.update.microsoft.com/v7/site/Search.asp
msrc
CVE-2026-20836HIGHCVSS 7.02026-01-13
CVE-2026-20836 [HIGH] CWE-362 DirectX Graphics Kernel Elevation of Privilege Vulnerability DirectX Graphics Kernel Elevation of Privilege Vulnerability Description: Concurrent execution using shared resource with improper synchronization ('race condition') in Graphics Kernel allows an authorized attacker to elevate privileges locally. FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability coul
msrc
CVE-2026-20866HIGHCVSS 7.82026-01-13
CVE-2026-20866 [HIGH] CWE-362 Windows Management Services Elevation of Privilege Vulnerability Windows Management Services Elevation of Privilege Vulnerability Description: Concurrent execution using shared resource with improper synchronization ('race condition') in Windows Management Services allows an authorized attacker to elevate privileges locally. FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability? Successful exploitation
msrc
CVE-2026-20844HIGHCVSS 7.42026-01-13
CVE-2026-20844 [HIGH] CWE-416 Windows Clipboard Server Elevation of Privilege Vulnerability Windows Clipboard Server Elevation of Privilege Vulnerability Description: Use after free in Windows Clipboard Server allows an unauthorized attacker to elevate privileges locally. FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. FAQ: According to the CVSS metric, th
msrc
CVE-2026-20842HIGHCVSS 7.02026-01-13
CVE-2026-20842 [HIGH] CWE-416 Microsoft DWM Core Library Elevation of Privilege Vulnerability Microsoft DWM Core Library Elevation of Privilege Vulnerability Description: Use after free in Windows DWM allows an authorized attacker to elevate privileges locally. FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability? For an attacker to exploit this vulnerability, they would need to have knowledge of a specific operation that triggers
msrc
CVE-2026-20858HIGHCVSS 7.82026-01-13
CVE-2026-20858 [HIGH] CWE-416 Windows Management Services Elevation of Privilege Vulnerability Windows Management Services Elevation of Privilege Vulnerability Description: Use after free in Windows Management Services allows an authorized attacker to elevate privileges locally. FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability? Successful exploitation of this vulnerability requires an attacker to win a race condition. FAQ: Acc
msrc
CVE-2026-20854HIGHCVSS 7.52026-01-13
CVE-2026-20854 [HIGH] CWE-416 Windows Local Security Authority Subsystem Service (LSASS) Remote Code Execution Vulnerability Windows Local Security Authority Subsystem Service (LSASS) Remote Code Execution Vulnerability Description: Use after free in Windows Local Security Authority Subsystem Service (LSASS) allows an authorized attacker to execute code over a network. FAQ: How could an attacker exploit this vulnerability? An attacker with the ability to modify certain directory attributes cou
msrc
CVE-2026-20941HIGHCVSS 7.82026-01-13
CVE-2026-20941 [HIGH] CWE-59 Host Process for Windows Tasks Elevation of Privilege Vulnerability Host Process for Windows Tasks Elevation of Privilege Vulnerability Description: Improper link resolution before file access ('link following') in Host Process for Windows Tasks allows an authorized attacker to elevate privileges locally. FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could
msrc
CVE-2026-20871HIGHCVSS 7.82026-01-13
CVE-2026-20871 [HIGH] CWE-416 Desktop Window Manager Elevation of Privilege Vulnerability Desktop Window Manager Elevation of Privilege Vulnerability Description: Use after free in Desktop Windows Manager allows an authorized attacker to elevate privileges locally. FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. Desktop Window Manager: Desktop Window Manag
msrc
CVE-2026-20934HIGHCVSS 7.52026-01-13
CVE-2026-20934 [HIGH] CWE-362 Windows SMB Server Elevation of Privilege Vulnerability Windows SMB Server Elevation of Privilege Vulnerability Description: Concurrent execution using shared resource with improper synchronization ('race condition') in Windows SMB Server allows an authorized attacker to elevate privileges over a network. FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability? Successful exploitation of this vulnerabilit
msrc
CVE-2026-20817HIGHCVSS 7.82026-01-13
CVE-2026-20817 [HIGH] CWE-280 Windows Error Reporting Service Elevation of Privilege Vulnerability Windows Error Reporting Service Elevation of Privilege Vulnerability Description: Improper handling of insufficient permissions or privileges in Windows Error Reporting allows an authorized attacker to elevate privileges locally. FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain S
msrc
CVE-2026-20874HIGHCVSS 7.82026-01-13
CVE-2026-20874 [HIGH] CWE-362 Windows Management Services Elevation of Privilege Vulnerability Windows Management Services Elevation of Privilege Vulnerability Description: Concurrent execution using shared resource with improper synchronization ('race condition') in Windows Management Services allows an authorized attacker to elevate privileges locally. FAQ: According to the CVSS metric, successful exploitation could lead to a scope change (S:C). What does this mean for this vulnerability? In
msrc
CVE-2026-20811HIGHCVSS 7.82026-01-13
CVE-2026-20811 [HIGH] CWE-843 Win32k Elevation of Privilege Vulnerability Win32k Elevation of Privilege Vulnerability Description: Access of resource using incompatible type ('type confusion') in Windows Win32K - ICOMP allows an authorized attacker to elevate privileges locally. FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. Windows Win32K - ICOMP: Window
msrc
CVE-2026-20877HIGHCVSS 7.82026-01-13
CVE-2026-20877 [HIGH] CWE-416 Windows Management Services Elevation of Privilege Vulnerability Windows Management Services Elevation of Privilege Vulnerability Description: Use after free in Windows Management Services allows an authorized attacker to elevate privileges locally. FAQ: According to the CVSS metric, successful exploitation could lead to a scope change (S:C). What does this mean for this vulnerability? In this case, a successful attack could be performed from a low privilege AppCo
msrc
CVE-2026-20822HIGHCVSS 7.82026-01-13
CVE-2026-20822 [HIGH] CWE-416 Windows Graphics Component Elevation of Privilege Vulnerability Windows Graphics Component Elevation of Privilege Vulnerability Description: Use after free in Microsoft Graphics Component allows an authorized attacker to elevate privileges locally. FAQ: According to the CVSS metric, a successful exploitation could lead to a scope change (S:C). What does this mean for this vulnerability? In a GPU paravirtualization scenario, an attacker who successfully exploited t
msrc
CVE-2026-0386HIGHCVSS 7.52026-01-13
CVE-2026-0386 [HIGH] CWE-284 Windows Deployment Services Remote Code Execution Vulnerability Windows Deployment Services Remote Code Execution Vulnerability Description: Improper access control in Windows Deployment Services allows an unauthorized attacker to execute code over an adjacent network. FAQ: Are there additional steps I need to take to be protected from this vulnerability? Admins should take the following steps to be protected from CVE-2026-0386: Audit existing WDS usage and identi
msrc
CVE-2026-20926HIGHCVSS 7.52026-01-13
CVE-2026-20926 [HIGH] CWE-362 Windows SMB Server Elevation of Privilege Vulnerability Windows SMB Server Elevation of Privilege Vulnerability Description: Concurrent execution using shared resource with improper synchronization ('race condition') in Windows SMB Server allows an authorized attacker to elevate privileges over a network. FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability? Successful exploitation of this vulnerabilit
msrc
CVE-2026-20867HIGHCVSS 7.82026-01-13
CVE-2026-20867 [HIGH] CWE-362 Windows Management Services Elevation of Privilege Vulnerability Windows Management Services Elevation of Privilege Vulnerability Description: Concurrent execution using shared resource with improper synchronization ('race condition') in Windows Management Services allows an authorized attacker to elevate privileges locally. FAQ: According to the CVSS metric, successful exploitation could lead to a scope change (S:C). What does this mean for this vulnerability? In
msrc
CVE-2026-20808HIGHCVSS 7.02026-01-13
CVE-2026-20808 [HIGH] CWE-362 Windows File Explorer Elevation of Privilege Vulnerability Windows File Explorer Elevation of Privilege Vulnerability Description: Concurrent execution using shared resource with improper synchronization ('race condition') in Printer Association Object allows an authorized attacker to elevate privileges locally. FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability? Successful exploitation of this vulne
msrc
Msrc Windows Server 2025 vulnerabilities | cvebase