Msrc Windows Server 2025 vulnerabilities
604 known vulnerabilities affecting msrc/windows_server_2025.
Total CVEs
604
CISA KEV
14
actively exploited
Public exploits
9
Exploited in wild
2
Severity breakdown
CRITICAL7HIGH401MEDIUM192LOW4
Vulnerabilities
Page 30 of 31
CVE-2024-49083MEDIUMCVSS 6.82024-12-10
CVE-2024-49083 [MEDIUM] CWE-125 Windows Mobile Broadband Driver Elevation of Privilege Vulnerability
Windows Mobile Broadband Driver Elevation of Privilege Vulnerability
FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability?
An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.
FAQ: According to the CVSS metric, the Attack Vector is Physical (AV:P). What does that mean for this vulnerability?
An attacker needs physic
msrc
CVE-2024-49073MEDIUMCVSS 6.82024-12-10
CVE-2024-49073 [MEDIUM] CWE-20 Windows Mobile Broadband Driver Elevation of Privilege Vulnerability
Windows Mobile Broadband Driver Elevation of Privilege Vulnerability
FAQ: According to the CVSS metric, the Attack Vector is Physical (AV:P). What does that mean for this vulnerability?
An attacker needs physical access to the target computer to plug in a malicious USB drive.
FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability?
An attacker who succes
msrc
CVE-2024-49081MEDIUMCVSS 6.62024-12-10
CVE-2024-49081 [MEDIUM] CWE-122 Wireless Wide Area Network Service (WwanSvc) Elevation of Privilege Vulnerability
Wireless Wide Area Network Service (WwanSvc) Elevation of Privilege Vulnerability
FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability?
An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.
Windows Wireless Wide Area Network Service: Windows Wireless Wide Area Network Service
Microsoft: Microsoft
Custo
msrc
CVE-2024-49111MEDIUMCVSS 6.62024-12-10
CVE-2024-49111 [MEDIUM] CWE-125 Wireless Wide Area Network Service (WwanSvc) Elevation of Privilege Vulnerability
Wireless Wide Area Network Service (WwanSvc) Elevation of Privilege Vulnerability
FAQ: According to the CVSS metric, the attack vector is physical (AV:P). What does that mean for this vulnerability?
To exploit this vulnerability, an attacker needs physical access to the victim's machine.
FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerabili
msrc
CVE-2024-49101MEDIUMCVSS 6.62024-12-10
CVE-2024-49101 [MEDIUM] CWE-125 Wireless Wide Area Network Service (WwanSvc) Elevation of Privilege Vulnerability
Wireless Wide Area Network Service (WwanSvc) Elevation of Privilege Vulnerability
FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability?
An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.
Windows Wireless Wide Area Network Service: Windows Wireless Wide Area Network Service
Microsoft: Microsoft
Custo
msrc
CVE-2024-49087MEDIUMCVSS 4.62024-12-10
CVE-2024-49087 [MEDIUM] CWE-20 Windows Mobile Broadband Driver Information Disclosure Vulnerability
Windows Mobile Broadband Driver Information Disclosure Vulnerability
FAQ: What type of information could be disclosed by this vulnerability?
Exploiting this vulnerability could allow the disclosure of initialized or uninitialized memory in the process heap.
FAQ: According to the CVSS metric, the Attack Vector is Physical (AV:P). What does that mean for this vulnerability?
An attacker needs physi
msrc
CVE-2024-49109MEDIUMCVSS 6.62024-12-10
CVE-2024-49109 [MEDIUM] CWE-125 Wireless Wide Area Network Service (WwanSvc) Elevation of Privilege Vulnerability
Wireless Wide Area Network Service (WwanSvc) Elevation of Privilege Vulnerability
FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability?
An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.
Windows Wireless Wide Area Network Service: Windows Wireless Wide Area Network Service
Microsoft: Microsoft
Custo
msrc
CVE-2024-43639CRITICALCVSS 9.82024-11-12
CVE-2024-43639 [CRITICAL] CWE-197 Windows KDC Proxy Remote Code Execution Vulnerability
Windows KDC Proxy Remote Code Execution Vulnerability
FAQ: How could an attacker exploit this vulnerability?
An unauthenticated attacker could use a specially crafted application to leverage a cryptographic protocol vulnerability in Windows Kerberos to perform remote code execution against the target.
FAQ: Is KDC Proxy Server service (KPSSVC) a dependency of KKDCP?
The vulnerability only exists on the KPSSV
msrc
CVE-2024-49039HIGHCVSS 8.8KEV2024-11-12
CVE-2024-49039 [HIGH] CWE-287 Windows Task Scheduler Elevation of Privilege Vulnerability
Windows Task Scheduler Elevation of Privilege Vulnerability
FAQ: How could an attacker exploit this vulnerability?
To exploit this vulnerability, an authenticated attacker would need to run a specially crafted application on the target system exploit the vulnerability to elevate their privileges to a Medium Integrity Level.
FAQ: According to the CVSS metric, successful exploitation could lead to a scope c
msrc
CVE-2024-43642HIGHCVSS 7.52024-11-12
CVE-2024-43642 [HIGH] CWE-416 Windows SMB Denial of Service Vulnerability
Windows SMB Denial of Service Vulnerability
Windows SMB: Windows SMB
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Denial of Service
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation More Likely
Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5046617
Reference: https://support.microsoft.com/help/5046617
Reference: https://catalog.update.micr
msrc
CVE-2024-43629HIGHCVSS 7.82024-11-12
CVE-2024-43629 [HIGH] CWE-822 Windows DWM Core Library Elevation of Privilege Vulnerability
Windows DWM Core Library Elevation of Privilege Vulnerability
FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability?
An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.
Windows DWM Core Library: Windows DWM Core Library
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Elevation of Privilege
Exploit Status: Publ
msrc
CVE-2024-43630HIGHCVSS 7.82024-11-12
CVE-2024-43630 [HIGH] CWE-121 Windows Kernel Elevation of Privilege Vulnerability
Windows Kernel Elevation of Privilege Vulnerability
FAQ: How could an attacker exploit this vulnerability?
An attacker could exploit this vulnerability by tricking a user into sending a request to a malicious server. This could result in the server returning malicious data that might cause arbitrary code execution on the user's system.
FAQ: What privileges could be gained by an attacker who successfully exploited
msrc
CVE-2024-49019HIGHCVSS 7.82024-11-12
CVE-2024-49019 [HIGH] CWE-1390 Active Directory Certificate Services Elevation of Privilege Vulnerability
Active Directory Certificate Services Elevation of Privilege Vulnerability
FAQ: What privileges could be gained by an attacker who successfully exploited the vulnerability?
An attacker who successfully exploited this vulnerability could gain domain administrator privileges.
FAQ: What types of certificates are vulnerable to this type of attack?
Certificates created using a version 1 certifi
msrc
CVE-2024-43450HIGHCVSS 7.52024-11-12
CVE-2024-43450 [HIGH] CWE-924 Windows DNS Spoofing Vulnerability
Windows DNS Spoofing Vulnerability
FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?
The attacker must inject themselves into the logical network path between the target and the resource requested by the victim to read or modify network communications. This is called a machine-in-the-middle (MITM) attack.
FAQ: According to the CVSS metric, user interaction is requ
msrc
CVE-2024-43625HIGHCVSS 8.12024-11-12
CVE-2024-43625 [HIGH] CWE-416 Microsoft Windows VMSwitch Elevation of Privilege Vulnerability
Microsoft Windows VMSwitch Elevation of Privilege Vulnerability
FAQ: According to the CVSS metric, a successful exploitation could lead to a scope change (S:C). What does this mean for this vulnerability?
In this case, a successful attack could be performed from a low privilege Hyper-V guest. The attacker could traverse the guest's security boundary to execute code on the Hyper-V host execution environ
msrc
CVE-2024-43624HIGHCVSS 8.82024-11-12
CVE-2024-43624 [HIGH] CWE-822 Windows Hyper-V Shared Virtual Disk Elevation of Privilege Vulnerability
Windows Hyper-V Shared Virtual Disk Elevation of Privilege Vulnerability
FAQ: How could an attacker exploit this vulnerability?
This vulnerability requires an authenticated attacker on a guest VM to send specially crafted file operation requests on the VM to the hardware resources on the VM.
FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability?
An
msrc
CVE-2024-43636HIGHCVSS 7.82024-11-12
CVE-2024-43636 [HIGH] CWE-822 Win32k Elevation of Privilege Vulnerability
Win32k Elevation of Privilege Vulnerability
FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability?
An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.
Windows DWM Core Library: Windows DWM Core Library
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Elevation of Privilege
Exploit Status: Publicly Disclosed:No;Exploited:No;Lates
msrc
CVE-2024-43452HIGHCVSS 7.52024-11-12
CVE-2024-43452 [HIGH] CWE-367 Windows Registry Elevation of Privilege Vulnerability
Windows Registry Elevation of Privilege Vulnerability
FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability?
An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.
FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?
Successful exploitation of this vulnerability requires a
msrc
CVE-2024-38264MEDIUMCVSS 5.92024-11-12
CVE-2024-38264 [MEDIUM] CWE-591 Microsoft Virtual Hard Disk (VHDX) Denial of Service Vulnerability
Microsoft Virtual Hard Disk (VHDX) Denial of Service Vulnerability
FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?
Successful exploitation of this vulnerability requires an attacker to win a race condition.
Microsoft Virtual Hard Drive: Microsoft Virtual Hard Drive
Microsoft: Microsoft
Customer Action Required: Yes
Impact: De
msrc
CVE-2024-43631MEDIUMCVSS 6.72024-11-12
CVE-2024-43631 [MEDIUM] CWE-822 Windows Secure Kernel Mode Elevation of Privilege Vulnerability
Windows Secure Kernel Mode Elevation of Privilege Vulnerability
FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability?
An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.
Windows Secure Kernel Mode: Windows Secure Kernel Mode
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Elevation of Privilege
Exploit St
msrc