Msrc Windows Server Version 1803 vulnerabilities
568 known vulnerabilities affecting msrc/windows_server_version_1803.
Total CVEs
568
CISA KEV
22
actively exploited
Public exploits
44
Exploited in wild
25
Severity breakdown
CRITICAL12HIGH376MEDIUM174LOW6
Vulnerabilities
Page 2 of 29
CVE-2020-1211HIGHCVSS 7.82020-06-09
CVE-2020-1211 [HIGH] Connected Devices Platform Service Elevation of Privilege Vulnerability
Connected Devices Platform Service Elevation of Privilege Vulnerability
Description: An elevation of privilege vulnerability exists in the way that the Connected Devices Platform Service handles objects in memory. An attacker who successfully exploited the vulnerability could execute code with elevated permissions.
To exploit the vulnerability, a locally authenticated attacker could run a specially craf
msrc
CVE-2020-1316HIGHCVSS 7.82020-06-09
CVE-2020-1316 [HIGH] Windows Kernel Elevation of Privilege Vulnerability
Windows Kernel Elevation of Privilege Vulnerability
Description: An elevation of privilege vulnerability exists when the Windows kernel fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.
To exploit this vulnerability,
msrc
CVE-2020-1324HIGHCVSS 7.82020-06-09
CVE-2020-1324 [HIGH] Windows Elevation of Privilege Vulnerability
Windows Elevation of Privilege Vulnerability
Description: An elevation of privilege (user to user) vulnerability exists in Windows Security Health Service when handling certain objects in memory.
To exploit the vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted command that could exploit the vulnerability to elevate privileges.
The update addresses the vulnerability
msrc
CVE-2020-1271HIGHCVSS 7.82020-06-09
CVE-2020-1271 [HIGH] Windows Backup Service Elevation of Privilege Vulnerability
Windows Backup Service Elevation of Privilege Vulnerability
Description: An elevation of privilege vulnerability exists when the Windows Backup Service improperly handles file operations.
To exploit this vulnerability, an attacker would first have to gain execution on the victim system. An attacker could then run a specially crafted application to elevate privileges.
The security update addresses the vulnerability
msrc
CVE-2020-0916HIGHCVSS 7.82020-06-09
CVE-2020-0916 [HIGH] Windows GDI Elevation of Privilege Vulnerability
Windows GDI Elevation of Privilege Vulnerability
Description: An elevation of privilege vulnerability exists in the way that the Windows Graphics Device Interface (GDI) handles objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.
To exploit this v
msrc
CVE-2020-1237HIGHCVSS 7.82020-06-09
CVE-2020-1237 [HIGH] Windows Kernel Elevation of Privilege Vulnerability
Windows Kernel Elevation of Privilege Vulnerability
Description: An elevation of privilege vulnerability exists in the way that the Windows Kernel handles objects in memory. An attacker who successfully exploited the vulnerability could execute code with elevated permissions.
To exploit the vulnerability, a locally authenticated attacker could run a specially crafted application.
The security update addresses the vulnerabi
msrc
CVE-2020-1278HIGHCVSS 7.82020-06-09
CVE-2020-1278 [HIGH] Diagnostics Hub Standard Collector Elevation of Privilege Vulnerability
Diagnostics Hub Standard Collector Elevation of Privilege Vulnerability
Description: An elevation of privilege vulnerability exists when the Diagnostics Hub Standard Collector Service improperly handles file operations. An attacker who successfully exploited this vulnerability could gain elevated privileges.
An attacker with unprivileged access to a vulnerable system could exploit this vulnerability.
Th
msrc
CVE-2020-1231HIGHCVSS 7.82020-06-09
CVE-2020-1231 [HIGH] Windows Runtime Elevation of Privilege Vulnerability
Windows Runtime Elevation of Privilege Vulnerability
Description: An elevation of privilege vulnerability exists when the Windows Runtime improperly handles objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in an elevated context.
An attacker could exploit this vulnerability by running a specially crafted application on the victim system.
The update addresses the vulnera
msrc
CVE-2020-1266HIGHCVSS 7.82020-06-09
CVE-2020-1266 [HIGH] Windows Kernel Elevation of Privilege Vulnerability
Windows Kernel Elevation of Privilege Vulnerability
Description: An elevation of privilege vulnerability exists when the Windows kernel fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.
To exploit this vulnerability,
msrc
CVE-2020-1286HIGHCVSS 7.82020-06-09
CVE-2020-1286 [HIGH] Windows Shell Remote Code Execution Vulnerability
Windows Shell Remote Code Execution Vulnerability
Description: A remote code execution vulnerability exists when the Windows Shell does not properly validate file paths.
An attacker who successfully exploited this vulnerability could run arbitrary code in the context of the current user. If the current user is logged on as an administrator, an attacker could take control of the affected system. An attacker could then install
msrc
CVE-2020-1280HIGHCVSS 7.82020-06-09
CVE-2020-1280 [HIGH] Windows Bluetooth Service Elevation of Privilege Vulnerability
Windows Bluetooth Service Elevation of Privilege Vulnerability
Description: An elevation of privilege vulnerability exists in the way that the Windows Bluetooth Service handles objects in memory. An attacker who successfully exploited the vulnerability could execute code with elevated permissions.
To exploit the vulnerability, a locally authenticated attacker could run a specially crafted application.
The securi
msrc
CVE-2020-1305HIGHCVSS 7.82020-06-09
CVE-2020-1305 [HIGH] Windows State Repository Service Elevation of Privilege Vulnerability
Windows State Repository Service Elevation of Privilege Vulnerability
Description: An elevation of privilege vulnerability exists when the Windows State Repository Service improperly handles objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in an elevated context.
An attacker could exploit this vulnerability by running a specially crafted application on
msrc
CVE-2020-1234HIGHCVSS 7.82020-06-09
CVE-2020-1234 [HIGH] Windows Error Reporting Elevation of Privilege Vulnerability
Windows Error Reporting Elevation of Privilege Vulnerability
Description: An elevation of privilege vulnerability exists when Windows Error Reporting improperly handles objects in memory.
To exploit this vulnerability, an attacker would first have to gain execution on the victim system. An attacker could then run a specially crafted application to elevate privileges.
The security update addresses the vulnerability
msrc
CVE-2020-1257HIGHCVSS 7.82020-06-09
CVE-2020-1257 [HIGH] Diagnostics Hub Standard Collector Elevation of Privilege Vulnerability
Diagnostics Hub Standard Collector Elevation of Privilege Vulnerability
Description: An elevation of privilege vulnerability exists when the Diagnostics Hub Standard Collector Service improperly handles file operations. An attacker who successfully exploited this vulnerability could gain elevated privileges.
An attacker with unprivileged access to a vulnerable system could exploit this vulnerability.
Th
msrc
CVE-2020-1282HIGHCVSS 7.82020-06-09
CVE-2020-1282 [HIGH] Windows Runtime Elevation of Privilege Vulnerability
Windows Runtime Elevation of Privilege Vulnerability
Description: An elevation of privilege vulnerability exists when the Windows Runtime improperly handles objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in an elevated context.
An attacker could exploit this vulnerability by running a specially crafted application on the victim system.
The update addresses the vulnera
msrc
CVE-2020-1279HIGHCVSS 7.82020-06-09
CVE-2020-1279 [HIGH] Windows Lockscreen Elevation of Privilege Vulnerability
Windows Lockscreen Elevation of Privilege Vulnerability
Description: An elevation of privilege vulnerability exists when Windows Lockscreen fails to properly load spotlight images from a secure location. An attacker who successfully exploited the vulnerability could execute commands with elevated permissions.
An authenticated attacker could modify a registry value to exploit this vulnerability.
The security update addr
msrc
CVE-2020-1203HIGHCVSS 7.82020-06-09
CVE-2020-1203 [HIGH] Diagnostic Hub Standard Collector Elevation of Privilege Vulnerability
Diagnostic Hub Standard Collector Elevation of Privilege Vulnerability
Description: An elevation of privilege vulnerability exists when the Diagnostics Hub Standard Collector or the Visual Studio Standard Collector fail to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run processes in an elevated context.
To exploit this vulnerability, an attacker woul
msrc
CVE-2020-1276HIGHCVSS 7.82020-06-09
CVE-2020-1276 [HIGH] Windows Kernel Elevation of Privilege Vulnerability
Windows Kernel Elevation of Privilege Vulnerability
Description: An elevation of privilege vulnerability exists when the Windows kernel fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.
To exploit this vulnerability,
msrc
CVE-2020-1292HIGHCVSS 8.82020-06-09
CVE-2020-1292 [HIGH] OpenSSH for Windows Elevation of Privilege Vulnerability
OpenSSH for Windows Elevation of Privilege Vulnerability
Description: An elevation of privilege vulnerability exists in OpenSSH for Windows when it does not properly restrict access to configuration settings. An attacker who successfully exploited this vulnerability could replace the shell with a malicious binary.
To exploit this vulnerability, an authenticated attacker would need to modify the OpenSSH for Windows con
msrc
CVE-2020-1241MEDIUMCVSS 5.32020-06-09
CVE-2020-1241 [HIGH] Windows Kernel Security Feature Bypass Vulnerability
Windows Kernel Security Feature Bypass Vulnerability
Description: A security feature bypass vulnerability exists when Windows Kernel fails to properly sanitize certain parameters.
To exploit the vulnerability, a locally-authenticated attacker could attempt to run a specially crafted application on a targeted system.
The update addresses the vulnerability by correcting how Windows Kernel handles parameter sanitization.
Mi
msrc