Msrc Windows Server Version 20H2 vulnerabilities
473 known vulnerabilities affecting msrc/windows_server_version_20h2.
Total CVEs
473
CISA KEV
17
actively exploited
Public exploits
8
Exploited in wild
19
Severity breakdown
CRITICAL18HIGH323MEDIUM130LOW2
Vulnerabilities
Page 21 of 24
CVE-2021-24079MEDIUMCVSS 5.52021-02-09
CVE-2021-24079 [MEDIUM] Windows Backup Engine Information Disclosure Vulnerability
Windows Backup Engine Information Disclosure Vulnerability
FAQ: What type of information could be disclosed by this vulnerability?
The type of information that could be disclosed if an attacker successfully exploited this vulnerability is sensitive information.
Windows Backup Engine: Windows Backup Engine
Microsoft: Microsoft
Impact: Information Disclosure
Exploit Status: Publicly Disclosed:No;Exploited:No;La
msrc
CVE-2021-24106MEDIUMCVSS 5.52021-02-09
CVE-2021-24106 [MEDIUM] Windows DirectX Information Disclosure Vulnerability
Windows DirectX Information Disclosure Vulnerability
FAQ: What type of information could be disclosed by this vulnerability?
The type of information that could be disclosed if an attacker successfully exploited this vulnerability is uninitialized memory.
Windows DirectX: Windows DirectX
Microsoft: Microsoft
Impact: Information Disclosure
Exploit Status: Publicly Disclosed:Yes;Exploited:No;Latest Software Release:Ex
msrc
CVE-2021-1731MEDIUMCVSS 5.52021-02-09
CVE-2021-1731 [MEDIUM] PFX Encryption Security Feature Bypass Vulnerability
PFX Encryption Security Feature Bypass Vulnerability
FAQ: What kind of security feature could be bypassed by successfully exploiting this vulnerability?
When exporting a SID-protected PFX file, keys encrypted using AES are not properly protected. Any SID-protected PFX files using AES for key encryption should be regenerated and exported after this update is installed.
Windows PFX Encryption: Windows PFX Encryption
Mic
msrc
CVE-2021-24082MEDIUMCVSS 4.32021-02-09
CVE-2021-24082 [MEDIUM] Microsoft.PowerShell.Utility Module WDAC Security Feature Bypass Vulnerability
Microsoft.PowerShell.Utility Module WDAC Security Feature Bypass Vulnerability
Windows PowerShell: Windows PowerShell
Microsoft: Microsoft
Impact: Security Feature Bypass
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A
Reference: https://catalog.update.microsoft.com/v7/site/Search.as
msrc
CVE-2021-24098MEDIUMCVSS 5.52021-02-09
CVE-2021-24098 [MEDIUM] Windows Console Driver Denial of Service Vulnerability
Windows Console Driver Denial of Service Vulnerability
FAQ: According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?
In a web-based attack scenario, an attacker could host a website (or leverage a compromised website that accepts or hosts user-provided content) that contains a specially crafted file that is designed to exploit the vulnerability. However, an attack
msrc
CVE-2021-1662HIGHCVSS 7.82021-01-12
CVE-2021-1662 [HIGH] Windows Event Tracing Elevation of Privilege Vulnerability
Windows Event Tracing Elevation of Privilege Vulnerability
Windows Event Tracing: Windows Event Tracing
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Elevation of Privilege
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A
Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB
msrc
CVE-2021-1703HIGHCVSS 7.82021-01-12
CVE-2021-1703 [HIGH] Windows Event Logging Service Elevation of Privilege Vulnerability
Windows Event Logging Service Elevation of Privilege Vulnerability
Windows Event Logging Service: Windows Event Logging Service
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Elevation of Privilege
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A
Reference: https://catalog.update.micros
msrc
CVE-2021-1710HIGHCVSS 7.82021-01-12
CVE-2021-1710 [HIGH] Microsoft Windows Media Foundation Remote Code Execution Vulnerability
Microsoft Windows Media Foundation Remote Code Execution Vulnerability
Windows Media: Windows Media
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Remote Code Execution
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A
Reference: https://catalog.update.microsoft.com/v7/site/Search.as
msrc
CVE-2021-1669HIGHCVSS 8.82021-01-12
CVE-2021-1669 [HIGH] Windows Remote Desktop Security Feature Bypass Vulnerability
Windows Remote Desktop Security Feature Bypass Vulnerability
FAQ: How do I get the update for Microsoft Remote Desktop for Android?
Tap the Google Play icon on your home screen.
Swipe in from the left edge of the screen.
Tap My apps & games.
Tap the Update box next to the Remote Desktop app.
Windows Remote Desktop: Windows Remote Desktop
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Security Fea
msrc
CVE-2021-1691HIGHCVSS 7.72021-01-12
CVE-2021-1691 [HIGH] Windows Hyper-V Denial of Service Vulnerability
Windows Hyper-V Denial of Service Vulnerability
Windows Hyper-V: Windows Hyper-V
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Denial of Service
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A
Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4598242
Reference: https://support.mic
msrc
CVE-2021-1685HIGHCVSS 7.32021-01-12
CVE-2021-1685 [HIGH] Windows AppX Deployment Extensions Elevation of Privilege Vulnerability
Windows AppX Deployment Extensions Elevation of Privilege Vulnerability
Windows AppX Deployment Extensions: Windows AppX Deployment Extensions
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Elevation of Privilege
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A
Reference: https://c
msrc
CVE-2021-1651HIGHCVSS 7.82021-01-12
CVE-2021-1651 [HIGH] Diagnostics Hub Standard Collector Elevation of Privilege Vulnerability
Diagnostics Hub Standard Collector Elevation of Privilege Vulnerability
Windows Diagnostic Hub: Windows Diagnostic Hub
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Elevation of Privilege
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A
Reference: https://catalog.update.microsoft.
msrc
CVE-2021-1642HIGHCVSS 7.82021-01-12
CVE-2021-1642 [HIGH] Windows AppX Deployment Extensions Elevation of Privilege Vulnerability
Windows AppX Deployment Extensions Elevation of Privilege Vulnerability
Windows AppX Deployment Extensions: Windows AppX Deployment Extensions
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Elevation of Privilege
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A
Reference: https://c
msrc
CVE-2021-1689HIGHCVSS 7.82021-01-12
CVE-2021-1689 [HIGH] Windows Multipoint Management Elevation of Privilege Vulnerability
Windows Multipoint Management Elevation of Privilege Vulnerability
Microsoft Windows: Microsoft Windows
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Elevation of Privilege
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A
Reference: https://catalog.update.microsoft.com/v7/site/Search.a
msrc
CVE-2021-1692HIGHCVSS 7.72021-01-12
CVE-2021-1692 [HIGH] Windows Hyper-V Denial of Service Vulnerability
Windows Hyper-V Denial of Service Vulnerability
Windows Hyper-V: Windows Hyper-V
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Denial of Service
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A
Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4601319
Reference: https://support.mic
msrc
CVE-2021-1648HIGHCVSS 7.82021-01-12
CVE-2021-1648 [HIGH] Microsoft splwow64 Elevation of Privilege Vulnerability
Microsoft splwow64 Elevation of Privilege Vulnerability
FAQ: What type of information could be disclosed by this vulnerability?
While this issue is labeled as an elevation of privilege, it can also be exploited to disclose information. The type of information that could be disclosed if an attacker successfully exploited this vulnerability is uninitialized memory.
This CVE is marked as Publicly Disclosed. In what way wa
msrc
CVE-2021-1697HIGHCVSS 7.82021-01-12
CVE-2021-1697 [HIGH] Windows InstallService Elevation of Privilege Vulnerability
Windows InstallService Elevation of Privilege Vulnerability
Windows Installer: Windows Installer
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Elevation of Privilege
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A
Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB459824
msrc
CVE-2021-1680HIGHCVSS 7.82021-01-12
CVE-2021-1680 [HIGH] Diagnostics Hub Standard Collector Elevation of Privilege Vulnerability
Diagnostics Hub Standard Collector Elevation of Privilege Vulnerability
Windows Diagnostic Hub: Windows Diagnostic Hub
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Elevation of Privilege
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A
Reference: https://catalog.update.microsoft.
msrc
CVE-2021-1682HIGHCVSS 7.02021-01-12
CVE-2021-1682 [HIGH] Windows Kernel Elevation of Privilege Vulnerability
Windows Kernel Elevation of Privilege Vulnerability
Windows Kernel: Windows Kernel
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Elevation of Privilege
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A
Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4598242
Reference: https://
msrc
CVE-2021-1638HIGHCVSS 7.72021-01-12
CVE-2021-1638 [HIGH] Windows Bluetooth Security Feature Bypass Vulnerability
Windows Bluetooth Security Feature Bypass Vulnerability
Description: Microsoft is aware of the "Impersonation in the Passkey Entry Protocol" vulnerability. For more information regarding the vulnerability, please see this statement from the Bluetooth SIG.
To address the vulnerability, Microsoft has released a software update that will fail attempts to pair if the remote device exchanges a public key with the same X coo
msrc