Msrc Windows Server 2025 vulnerabilities

604 known vulnerabilities affecting msrc/windows_server_2025.

Total CVEs
604
CISA KEV
14
actively exploited
Public exploits
9
Exploited in wild
2
Severity breakdown
CRITICAL7HIGH401MEDIUM192LOW4

Vulnerabilities

Page 9 of 31
CVE-2025-58731HIGHCVSS 7.02025-10-14
CVE-2025-58731 [HIGH] CWE-416 Inbox COM Objects (Global Memory) Remote Code Execution Vulnerability Inbox COM Objects (Global Memory) Remote Code Execution Vulnerability Description: Use after free in Inbox COM Objects allows an unauthorized attacker to execute code locally. FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability? Successful exploitation of this vulnerability requires an attacker to win a race condition. FAQ: Accordi
msrc
CVE-2025-59202HIGHCVSS 7.02025-10-14
CVE-2025-59202 [HIGH] CWE-416 Windows Remote Desktop Services Elevation of Privilege Vulnerability Windows Remote Desktop Services Elevation of Privilege Vulnerability Description: Use after free in Windows Remote Desktop Services allows an authorized attacker to elevate privileges locally. FAQ: What privileges could be gained by an attacker who successfully exploited the vulnerability? An attacker who successfully exploited this vulnerability could gain administrator privileges. FAQ: Accordi
msrc
CVE-2025-54957HIGHCVSS 7.02025-10-14
CVE-2025-54957 [CRITICAL] CWE-502 MITRE CVE-2025-54957: Integer overflow in Dolby Digital Plus audio decoder MITRE CVE-2025-54957: Integer overflow in Dolby Digital Plus audio decoder Description: Deserialization of untrusted data in Microsoft Windows Codecs Library allows an unauthorized attacker to execute code locally. FAQ: According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do? An attacker must send a user a malicious Office file and c
msrc
CVE-2025-58737HIGHCVSS 7.02025-10-14
CVE-2025-58737 [HIGH] CWE-416 Remote Desktop Protocol Remote Code Execution Vulnerability Remote Desktop Protocol Remote Code Execution Vulnerability Description: Use after free in Windows Remote Desktop allows an unauthorized attacker to execute code locally. FAQ: According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do? An attacker must send a user a malicious Office file and convince them to open it. FAQ: According to the CVSS metric, th
msrc
CVE-2025-55696HIGHCVSS 7.82025-10-14
CVE-2025-55696 [HIGH] CWE-367 NtQueryInformation Token function (ntifs.h) Elevation of Privilege Vulnerability NtQueryInformation Token function (ntifs.h) Elevation of Privilege Vulnerability Description: Time-of-check time-of-use (toctou) race condition in NtQueryInformation Token function (ntifs.h) allows an authorized attacker to elevate privileges locally. FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploit
msrc
CVE-2025-55684HIGHCVSS 7.02025-10-14
CVE-2025-55684 [HIGH] CWE-416 Windows PrintWorkflowUserSvc Elevation of Privilege Vulnerability Windows PrintWorkflowUserSvc Elevation of Privilege Vulnerability Description: Use after free in Windows PrintWorkflowUserSvc allows an authorized attacker to elevate privileges locally. FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability? Successful exploitation of this vulnerability requires an attacker to win a race condition. FAQ:
msrc
CVE-2025-55694HIGHCVSS 7.82025-10-14
CVE-2025-55694 [HIGH] CWE-284 Windows Error Reporting Service Elevation of Privilege Vulnerability Windows Error Reporting Service Elevation of Privilege Vulnerability Description: Improper access control in Windows Error Reporting allows an authorized attacker to elevate privileges locally. FAQ: What privileges could be gained by an attacker who successfully exploited the vulnerability? An attacker who successfully exploited this vulnerability could gain administrator privileges. Windows Err
msrc
CVE-2025-59502HIGHCVSS 7.52025-10-14
CVE-2025-59502 [HIGH] CWE-400 Remote Procedure Call Denial of Service Vulnerability Remote Procedure Call Denial of Service Vulnerability Description: Uncontrolled resource consumption in Windows Remote Procedure Call allows an unauthorized attacker to deny service over a network. Windows Remote Procedure Call: Windows Remote Procedure Call Microsoft: Microsoft Customer Action Required: Yes Impact: Denial of Service Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release
msrc
CVE-2025-55340HIGHCVSS 7.02025-10-14
CVE-2025-55340 [HIGH] CWE-287 Windows Remote Desktop Protocol Security Feature Bypass Windows Remote Desktop Protocol Security Feature Bypass Description: Improper authentication in Windows Remote Desktop Protocol allows an authorized attacker to bypass a security feature locally. FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability? Successful exploitation of this vulnerability requires multiple conditions to be met. The attacker
msrc
CVE-2025-55691HIGHCVSS 7.02025-10-14
CVE-2025-55691 [HIGH] CWE-416 Windows PrintWorkflowUserSvc Elevation of Privilege Vulnerability Windows PrintWorkflowUserSvc Elevation of Privilege Vulnerability Description: Use after free in Windows PrintWorkflowUserSvc allows an authorized attacker to elevate privileges locally. FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability? Successful exploitation of this vulnerability requires an attacker to win a race condition. FAQ:
msrc
CVE-2025-55685HIGHCVSS 7.02025-10-14
CVE-2025-55685 [HIGH] CWE-416 Windows PrintWorkflowUserSvc Elevation of Privilege Vulnerability Windows PrintWorkflowUserSvc Elevation of Privilege Vulnerability Description: Use after free in Windows PrintWorkflowUserSvc allows an authorized attacker to elevate privileges locally. FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. FAQ: According to the CVSS
msrc
CVE-2025-58715HIGHCVSS 8.82025-10-14
CVE-2025-58715 [HIGH] CWE-190 Windows Speech Runtime Elevation of Privilege Vulnerability Windows Speech Runtime Elevation of Privilege Vulnerability Description: Integer overflow or wraparound in Microsoft Windows Speech allows an authorized attacker to elevate privileges locally. FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. FAQ: According to the CVSS
msrc
CVE-2025-53150HIGHCVSS 7.82025-10-14
CVE-2025-53150 [HIGH] CWE-416 Windows Digital Media Elevation of Privilege Vulnerability Windows Digital Media Elevation of Privilege Vulnerability Description: Use after free in Windows Digital Media allows an authorized attacker to elevate privileges locally. FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could elevate from a low integrity level up to a medium integrity level. Windo
msrc
CVE-2025-58727HIGHCVSS 7.02025-10-14
CVE-2025-58727 [HIGH] CWE-362 Windows Connected Devices Platform Service Elevation of Privilege Vulnerability Windows Connected Devices Platform Service Elevation of Privilege Vulnerability Description: Concurrent execution using shared resource with improper synchronization ('race condition') in Windows Connected Devices Platform Service allows an authorized attacker to elevate privileges locally. FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for
msrc
CVE-2025-55331HIGHCVSS 7.02025-10-14
CVE-2025-55331 [HIGH] CWE-416 Windows PrintWorkflowUserSvc Elevation of Privilege Vulnerability Windows PrintWorkflowUserSvc Elevation of Privilege Vulnerability Description: Use after free in Windows PrintWorkflowUserSvc allows an authorized attacker to elevate privileges locally. FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability? Successful exploitation of this vulnerability requires an attacker to win a race condition. FAQ:
msrc
CVE-2025-59200HIGHCVSS 7.72025-10-14
CVE-2025-59200 [HIGH] CWE-362 Data Sharing Service Spoofing Vulnerability Data Sharing Service Spoofing Vulnerability Description: Concurrent execution using shared resource with improper synchronization ('race condition') in Data Sharing Service Client allows an unauthorized attacker to perform spoofing locally. FAQ: According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do? The user would have to click a specially crafted button for the att
msrc
CVE-2025-59289HIGHCVSS 7.02025-10-14
CVE-2025-59289 [HIGH] CWE-415 Windows Bluetooth Service Elevation of Privilege Vulnerability Windows Bluetooth Service Elevation of Privilege Vulnerability Description: Double free in Windows Bluetooth Service allows an authorized attacker to elevate privileges locally. FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability? Successful exploitation of this vulnerability requires an attacker to win a race condition. FAQ: What privile
msrc
CVE-2025-55689HIGHCVSS 7.02025-10-14
CVE-2025-55689 [HIGH] CWE-416 Windows PrintWorkflowUserSvc Elevation of Privilege Vulnerability Windows PrintWorkflowUserSvc Elevation of Privilege Vulnerability Description: Use after free in Windows PrintWorkflowUserSvc allows an authorized attacker to elevate privileges locally. FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability? Successful exploitation of this vulnerability requires an attacker to win a race condition. FAQ:
msrc
CVE-2025-59206HIGHCVSS 7.42025-10-14
CVE-2025-59206 [HIGH] CWE-416 Windows Resilient File System (ReFS) Deduplication Service Elevation of Privilege Vulnerability Windows Resilient File System (ReFS) Deduplication Service Elevation of Privilege Vulnerability FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that m
msrc
CVE-2025-59210HIGHCVSS 7.42025-10-14
CVE-2025-59210 [HIGH] CWE-416 Windows Resilient File System (ReFS) Deduplication Service Elevation of Privilege Vulnerability Windows Resilient File System (ReFS) Deduplication Service Elevation of Privilege Vulnerability FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability? Successful exploitation of this vulnerability requires an attacker to win a race condition. FAQ: What privileges could be gained by an attacker who successfull
msrc