Msrc Windows Server Version 20H2 vulnerabilities
473 known vulnerabilities affecting msrc/windows_server_version_20h2.
Total CVEs
473
CISA KEV
17
actively exploited
Public exploits
8
Exploited in wild
19
Severity breakdown
CRITICAL18HIGH323MEDIUM130LOW2
Vulnerabilities
Page 2 of 24
CVE-2022-35757HIGHCVSS 7.32022-08-09
CVE-2022-35757 [HIGH] Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability
Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability
FAQ: What privileges could be gained by an attacker who successfully exploited the vulnerability?
A domain user could use this vulnerability to elevate privileges to SYSTEM assigned integrity level.
FAQ: According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?
This vuln
msrc
CVE-2022-34302HIGHCVSS 6.72022-08-09
CVE-2022-34302 [MEDIUM] CERT/CC: CVE-2022-34302 New Horizon Data Systems Inc Boot Loader Bypass
CERT/CC: CVE-2022-34302 New Horizon Data Systems Inc Boot Loader Bypass
FAQ: What kind of security feature could be bypassed by successfully exploiting this vulnerability?
An attacker who successfully exploited this vulnerability could bypass Secure Boot.
FAQ: Why are there different security update packages for this CVE?
These are standalone security updates. These packages must be installed in add
msrc
CVE-2022-34699HIGHCVSS 7.82022-08-09
CVE-2022-34699 [HIGH] Windows Win32k Elevation of Privilege Vulnerability
Windows Win32k Elevation of Privilege Vulnerability
FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability?
An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.
Windows Win32K: Windows Win32K
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Elevation of Privilege
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software R
msrc
CVE-2022-35765HIGHCVSS 7.82022-08-09
CVE-2022-35765 [HIGH] Storage Spaces Direct Elevation of Privilege Vulnerability
Storage Spaces Direct Elevation of Privilege Vulnerability
FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability?
An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.
FAQ: According to the CVSS metric, privileges required is low (PR:L). What does that mean for this vulnerability?
Any authenticated user could trigger this vulnerability.
msrc
CVE-2022-34712MEDIUMCVSS 5.52022-08-09
CVE-2022-34712 [MEDIUM] Windows Defender Credential Guard Information Disclosure Vulnerability
Windows Defender Credential Guard Information Disclosure Vulnerability
FAQ: What type of information could be disclosed by this vulnerability?
An attacker who successfully exploited this vulnerability could access Kerberos protected data.
Windows Defender Credential Guard: Windows Defender Credential Guard
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Information Disclosure
Exploit S
msrc
CVE-2022-30197MEDIUMCVSS 5.52022-08-09
CVE-2022-30197 [MEDIUM] Windows Kernel Information Disclosure Vulnerability
Windows Kernel Information Disclosure Vulnerability
FAQ: What kind of security feature could be bypassed by successfully exploiting this vulnerability?
An attacker who successfully exploited this vulnerability could bypass KASLR (Kernel Address Space Layout Randomization). See Mitigate threats by using Windows 10 security features.
FAQ: According to the CVSS metric, privileges required is low (PR:L). What does that mea
msrc
CVE-2022-35754MEDIUMCVSS 6.72022-08-09
CVE-2022-35754 [MEDIUM] Unified Write Filter Elevation of Privilege Vulnerability
Unified Write Filter Elevation of Privilege Vulnerability
FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability?
An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.
Windows Unified Write Filter: Windows Unified Write Filter
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Elevation of Privilege
Exploit Status: Publicly D
msrc
CVE-2022-34709MEDIUMCVSS 6.02022-08-09
CVE-2022-34709 [MEDIUM] Windows Defender Credential Guard Security Feature Bypass Vulnerability
Windows Defender Credential Guard Security Feature Bypass Vulnerability
FAQ: What kind of security feature could be bypassed by successfully exploiting this vulnerability?
An attacker who successfully exploited this vulnerability could bypass Kerberos protection used by Defender Credential Guard.
Windows Defender Credential Guard: Windows Defender Credential Guard
Microsoft: Microsoft
Customer Act
msrc
CVE-2022-34710MEDIUMCVSS 5.52022-08-09
CVE-2022-34710 [MEDIUM] Windows Defender Credential Guard Information Disclosure Vulnerability
Windows Defender Credential Guard Information Disclosure Vulnerability
FAQ: What type of information could be disclosed by this vulnerability?
An attacker who successfully exploited this vulnerability could access Kerberos protected data.
Windows Defender Credential Guard: Windows Defender Credential Guard
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Information Disclosure
Exploit S
msrc
CVE-2022-34704MEDIUMCVSS 4.72022-08-09
CVE-2022-34704 [MEDIUM] Windows Defender Credential Guard Information Disclosure Vulnerability
Windows Defender Credential Guard Information Disclosure Vulnerability
FAQ: What type of information could be disclosed by this vulnerability?
An attacker who successfully exploited this vulnerability could recover plaintext from TLS-protected data.
Windows Defender Credential Guard: Windows Defender Credential Guard
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Information Disclosure
msrc
CVE-2022-22029HIGHCVSS 8.12022-07-12
CVE-2022-22029 [HIGH] Windows Network File System Remote Code Execution Vulnerability
Windows Network File System Remote Code Execution Vulnerability
FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?
Successful exploitation of this vulnerability requires an attacker to invest time in repeated exploitation attempts through sending constant or intermittent data.
FAQ: How could an attacker exploit this vulnerability?
This vulnerab
msrc
CVE-2022-27776HIGHCVSS 6.52022-07-12
CVE-2022-27776 [MEDIUM] HackerOne: CVE-2022-27776 Insufficiently protected credentials vulnerability might leak authentication or cookie header data
HackerOne: CVE-2022-27776 Insufficiently protected credentials vulnerability might leak authentication or cookie header data
FAQ: Why is this a HackerOne CVE?
This CVE is regarding a vulnerability in the curl open source library which is used by Windows. The July 2022 Windows Security Updates includes the most recent version of this library which a
msrc
CVE-2022-22031HIGHCVSS 7.82022-07-12
CVE-2022-22031 [HIGH] Windows Credential Guard Domain-joined Public Key Elevation of Privilege Vulnerability
Windows Credential Guard Domain-joined Public Key Elevation of Privilege Vulnerability
FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability?
An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.
Windows Credential Guard: Windows Credential Guard
Microsoft: Microsoft
Customer Action Required: Yes
Impact: El
msrc
CVE-2022-30216HIGHCVSS 8.82022-07-12
CVE-2022-30216 [HIGH] Windows Server Service Tampering Vulnerability
Windows Server Service Tampering Vulnerability
FAQ: How could an attacker exploit this vulnerability?
For successful exploitation, a malicious certificate needs to be imported on an affected system. An authenticated attacker could remotely upload a certificate to the Server service.
Windows Server Service: Windows Server Service
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Tampering
Exploit Status: Publicly
msrc
CVE-2022-22038HIGHCVSS 8.12022-07-12
CVE-2022-22038 [HIGH] Remote Procedure Call Runtime Remote Code Execution Vulnerability
Remote Procedure Call Runtime Remote Code Execution Vulnerability
FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?
Successful exploitation of this vulnerability requires an attacker to invest time in repeated exploitation attempts through sending constant or intermittent data.
Windows Remote Procedure Call Runtime: Windows Remote Procedure
msrc
CVE-2022-22039HIGHCVSS 7.52022-07-12
CVE-2022-22039 [HIGH] Windows Network File System Remote Code Execution Vulnerability
Windows Network File System Remote Code Execution Vulnerability
FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?
Successful exploitation of this vulnerability requires an attacker to win a race condition.
FAQ: How could an attacker exploit this vulnerability?
This vulnerability could be exploited over the network by making an unauthenticated,
msrc
CVE-2022-30222HIGHCVSS 8.42022-07-12
CVE-2022-30222 [HIGH] Windows Shell Remote Code Execution Vulnerability
Windows Shell Remote Code Execution Vulnerability
FAQ: How could an attacker exploit this vulnerability?
An unauthenticated attacker could interact with the login screen of a vulnerable system in a specific manner to execute code on that system.
Windows Shell: Windows Shell
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Remote Code Execution
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software
msrc
CVE-2022-22045HIGHCVSS 7.82022-07-12
CVE-2022-22045 [HIGH] Windows.Devices.Picker.dll Elevation of Privilege Vulnerability
Windows.Devices.Picker.dll Elevation of Privilege Vulnerability
FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?
Successful exploitation of this vulnerability requires an attacker to win a race condition.
FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability?
An attacker who successfully exploited t
msrc
CVE-2022-30215HIGHCVSS 7.52022-07-12
CVE-2022-30215 [HIGH] Active Directory Federation Services Elevation of Privilege Vulnerability
Active Directory Federation Services Elevation of Privilege Vulnerability
FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?
Successful exploitation of this vulnerability requires an attacker to take additional actions prior to exploitation to prepare the target environment.
FAQ: What privileges could be gained by an attacker who succ
msrc
CVE-2022-22041MEDIUMCVSS 6.82022-07-12
CVE-2022-22041 [MEDIUM] Windows Print Spooler Elevation of Privilege Vulnerability
Windows Print Spooler Elevation of Privilege Vulnerability
FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability?
An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.
FAQ: According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?
The user would have to click on a specially crafted U
msrc