Msrc Windows Server Version 20H2 vulnerabilities
473 known vulnerabilities affecting msrc/windows_server_version_20h2.
Total CVEs
473
CISA KEV
17
actively exploited
Public exploits
8
Exploited in wild
19
Severity breakdown
CRITICAL18HIGH323MEDIUM130LOW2
Vulnerabilities
Page 12 of 24
CVE-2021-41334HIGHCVSS 7.02021-10-12
CVE-2021-41334 [HIGH] Windows Desktop Bridge Elevation of Privilege Vulnerability
Windows Desktop Bridge Elevation of Privilege Vulnerability
Windows Desktop Bridge: Windows Desktop Bridge
Microsoft: Microsoft
Impact: Elevation of Privilege
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A
Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5006670
Reference: https:
msrc
CVE-2021-40464HIGHCVSS 8.02021-10-12
CVE-2021-40464 [HIGH] Windows Nearby Sharing Elevation of Privilege Vulnerability
Windows Nearby Sharing Elevation of Privilege Vulnerability
Windows Nearby Sharing: Windows Nearby Sharing
Microsoft: Microsoft
Impact: Elevation of Privilege
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A
Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5006672
Reference: https:
msrc
CVE-2021-41347HIGHCVSS 7.82021-10-12
CVE-2021-41347 [HIGH] Windows AppX Deployment Service Elevation of Privilege Vulnerability
Windows AppX Deployment Service Elevation of Privilege Vulnerability
Windows AppX Deployment Service: Windows AppX Deployment Service
Microsoft: Microsoft
Impact: Elevation of Privilege
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A
Reference: https://catalog.update.microsoft.com/v7/site/Search
msrc
CVE-2021-41357HIGHCVSS 7.8KEV2021-10-12
CVE-2021-41357 [HIGH] Win32k Elevation of Privilege Vulnerability
Win32k Elevation of Privilege Vulnerability
Windows Win32K: Windows Win32K
Microsoft: Microsoft
Impact: Elevation of Privilege
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation More Likely;Older Software Release:Exploitation More Likely;DOS:N/A
Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5006670
Reference: https://support.microsoft.com/help/5006670
Reference:
msrc
CVE-2021-40462HIGHCVSS 7.82021-10-12
CVE-2021-40462 [HIGH] Windows Media Foundation Dolby Digital Atmos Decoders Remote Code Execution Vulnerability
Windows Media Foundation Dolby Digital Atmos Decoders Remote Code Execution Vulnerability
Microsoft Windows Codecs Library: Microsoft Windows Codecs Library
Microsoft: Microsoft
Impact: Remote Code Execution
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A
Reference: https://
msrc
CVE-2021-40475MEDIUMCVSS 5.52021-10-12
CVE-2021-40475 [MEDIUM] Windows Cloud Files Mini Filter Driver Information Disclosure Vulnerability
Windows Cloud Files Mini Filter Driver Information Disclosure Vulnerability
FAQ: What type of information could be disclosed by this vulnerability?
The type of information that could be disclosed if an attacker successfully exploited this vulnerability is the contents of Kernel memory. An attacker could read the contents of Kernel memory from a user mode process.
Windows Cloud Files Mini Filter
msrc
CVE-2021-41346MEDIUMCVSS 5.32021-10-12
CVE-2021-41346 [MEDIUM] Console Window Host Security Feature Bypass Vulnerability
Console Window Host Security Feature Bypass Vulnerability
Console Window Host: Console Window Host
Microsoft: Microsoft
Impact: Security Feature Bypass
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A
Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5006670
Reference: https://suppo
msrc
CVE-2021-41361MEDIUMCVSS 5.42021-10-12
CVE-2021-41361 [MEDIUM] Active Directory Federation Server Spoofing Vulnerability
Active Directory Federation Server Spoofing Vulnerability
FAQ: How could an attacker exploit this vulnerability?
The ADFS (Active Directory Federation Services) services are vulnerable during the logout redirect request to cross-site scripting of the post logout redirect URI. An attacker who successfully exploited this vulnerability could leave an application using this ADFS library vulnerable to common XSS attack
msrc
CVE-2021-40456MEDIUMCVSS 5.32021-10-12
CVE-2021-40456 [MEDIUM] Windows AD FS Security Feature Bypass Vulnerability
Windows AD FS Security Feature Bypass Vulnerability
FAQ: What kind of security feature could be bypassed by successfully exploiting this vulnerability?
This vulnerability could allow an attacker to bypass ADFS BannedIPList entries for WS-Trust workflows.
Role: Windows AD FS Server: Role: Windows AD FS Server
Microsoft: Microsoft
Impact: Security Feature Bypass
Exploit Status: Publicly Disclosed:No;Exploited:No;Lates
msrc
CVE-2021-41339MEDIUMCVSS 4.72021-10-12
CVE-2021-41339 [MEDIUM] Microsoft DWM Core Library Elevation of Privilege Vulnerability
Microsoft DWM Core Library Elevation of Privilege Vulnerability
Windows DWM Core Library: Windows DWM Core Library
Microsoft: Microsoft
Impact: Elevation of Privilege
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A
Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5006667
Ref
msrc
CVE-2021-41337MEDIUMCVSS 4.92021-10-12
CVE-2021-41337 [MEDIUM] Active Directory Security Feature Bypass Vulnerability
Active Directory Security Feature Bypass Vulnerability
FAQ: What kind of security feature could be bypassed by successfully exploiting this vulnerability?
This vulnerability could allow an attacker to bypass Active Directory domain permissions for Key Admins groups.
Role: Windows Active Directory Server: Role: Windows Active Directory Server
Microsoft: Microsoft
Impact: Security Feature Bypass
Exploit Status: Pub
msrc
CVE-2021-40468MEDIUMCVSS 5.52021-10-12
CVE-2021-40468 [MEDIUM] Windows Bind Filter Driver Information Disclosure Vulnerability
Windows Bind Filter Driver Information Disclosure Vulnerability
FAQ: What type of information could be disclosed by this vulnerability?
The type of information that could be disclosed if an attacker successfully exploited this vulnerability is the contents of Kernel memory. An attacker could read the contents of Kernel memory from a user mode process.
Windows Bind Filter Driver: Windows Bind Filter Driver
msrc
CVE-2021-41338MEDIUMCVSS 5.52021-10-12
CVE-2021-41338 [MEDIUM] Windows AppContainer Firewall Rules Security Feature Bypass Vulnerability
Windows AppContainer Firewall Rules Security Feature Bypass Vulnerability
Windows AppContainer: Windows AppContainer
Microsoft: Microsoft
Impact: Security Feature Bypass
Exploit Status: Publicly Disclosed:Yes;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A
Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=
msrc
CVE-2021-36975HIGHCVSS 7.82021-09-14
CVE-2021-36975 [HIGH] Win32k Elevation of Privilege Vulnerability
Win32k Elevation of Privilege Vulnerability
Windows Win32K: Windows Win32K
Microsoft: Microsoft
Impact: Elevation of Privilege
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation More Likely;Older Software Release:Exploitation More Likely;DOS:N/A
Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005568
Reference: https://support.microsoft.com/help/5005568
Reference:
msrc
CVE-2021-38634HIGHCVSS 7.12021-09-14
CVE-2021-38634 [HIGH] Microsoft Windows Update Client Elevation of Privilege Vulnerability
Microsoft Windows Update Client Elevation of Privilege Vulnerability
Windows Update: Windows Update
Microsoft: Microsoft
Impact: Elevation of Privilege
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A
Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005568
Reference: http
msrc
CVE-2021-36973HIGHCVSS 7.82021-09-14
CVE-2021-36973 [HIGH] Windows Redirected Drive Buffering System Elevation of Privilege Vulnerability
Windows Redirected Drive Buffering System Elevation of Privilege Vulnerability
Windows Redirected Drive Buffering: Windows Redirected Drive Buffering
Microsoft: Microsoft
Impact: Elevation of Privilege
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A
Reference: https://catalog.update.mi
msrc
CVE-2021-36954HIGHCVSS 8.82021-09-14
CVE-2021-36954 [HIGH] Windows Bind Filter Driver Elevation of Privilege Vulnerability
Windows Bind Filter Driver Elevation of Privilege Vulnerability
Windows Bind Filter Driver: Windows Bind Filter Driver
Microsoft: Microsoft
Impact: Elevation of Privilege
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A
Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005568
R
msrc
CVE-2021-36967HIGHCVSS 8.02021-09-14
CVE-2021-36967 [HIGH] Windows WLAN AutoConfig Service Elevation of Privilege Vulnerability
Windows WLAN AutoConfig Service Elevation of Privilege Vulnerability
Windows WLAN Service: Windows WLAN Service
Microsoft: Microsoft
Impact: Elevation of Privilege
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A
Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005568
Ref
msrc
CVE-2021-36966HIGHCVSS 7.82021-09-14
CVE-2021-36966 [HIGH] Windows Subsystem for Linux Elevation of Privilege Vulnerability
Windows Subsystem for Linux Elevation of Privilege Vulnerability
Windows Subsystem for Linux: Windows Subsystem for Linux
Microsoft: Microsoft
Impact: Elevation of Privilege
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A
Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB500556
msrc
CVE-2021-38637MEDIUMCVSS 5.52021-09-14
CVE-2021-38637 [MEDIUM] Windows Storage Information Disclosure Vulnerability
Windows Storage Information Disclosure Vulnerability
FAQ: What type of information could be disclosed by this vulnerability?
The type of information that could be disclosed if an attacker successfully exploited this vulnerability is unauthorized file system access - reading from the file system.
Windows Storage: Windows Storage
Microsoft: Microsoft
Impact: Information Disclosure
Exploit Status: Publicly Disclosed:N
msrc