Msrc Windows Server Version 20H2 vulnerabilities
473 known vulnerabilities affecting msrc/windows_server_version_20h2.
Total CVEs
473
CISA KEV
17
actively exploited
Public exploits
8
Exploited in wild
19
Severity breakdown
CRITICAL18HIGH323MEDIUM130LOW2
Vulnerabilities
Page 8 of 24
CVE-2022-21975MEDIUMCVSS 4.72022-03-08
CVE-2022-21975 [MEDIUM] Windows Hyper-V Denial of Service Vulnerability
Windows Hyper-V Denial of Service Vulnerability
FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?
Successful exploitation of this vulnerability requires an attacker to win a race condition.
Role: Windows Hyper-V: Role: Windows Hyper-V
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Denial of Service
Exploit Status: Publicly Disclosed:No;Explo
msrc
CVE-2022-21977LOWCVSS 3.32022-03-08
CVE-2022-21977 [LOW] Media Foundation Information Disclosure Vulnerability
Media Foundation Information Disclosure Vulnerability
FAQ: What type of information could be disclosed by this vulnerability?
An attacker who successfully exploited this vulnerability could potentially read small portions of heap memory.
Microsoft Windows Codecs Library: Microsoft Windows Codecs Library
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Information Disclosure
Exploit Status: Publicly Disclos
msrc
CVE-2022-21984HIGHCVSS 8.82022-02-08
CVE-2022-21984 [HIGH] Windows DNS Server Remote Code Execution Vulnerability
Windows DNS Server Remote Code Execution Vulnerability
Role: DNS Server: Role: DNS Server
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Remote Code Execution
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A
Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010345
Reference
msrc
CVE-2022-21974HIGHCVSS 7.82022-02-08
CVE-2022-21974 [HIGH] Roaming Security Rights Management Services Remote Code Execution Vulnerability
Roaming Security Rights Management Services Remote Code Execution Vulnerability
FAQ: According to the CVSS score, the Attack Vector is Local. Why does the CVE title indicate that this is a Remote Code Execution?
The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution/"ACE". The attack itself is carried out lo
msrc
CVE-2022-21995HIGHCVSS 7.92022-02-08
CVE-2022-21995 [HIGH] Windows Hyper-V Remote Code Execution Vulnerability
Windows Hyper-V Remote Code Execution Vulnerability
FAQ: According to the CVSS metric, a successful exploitation could lead to a scope change (S:C). What does this mean for this vulnerability?
In this case, a successful attack could be performed from a low privilege Hyper-V guest. The attacker could traverse the guest's security boundary to execute code on the Hyper-V host execution environment.
FAQ: According to the CVS
msrc
CVE-2022-22715HIGHCVSS 7.82022-02-08
CVE-2022-22715 [HIGH] Named Pipe File System Elevation of Privilege Vulnerability
Named Pipe File System Elevation of Privilege Vulnerability
Windows Named Pipe File System: Windows Named Pipe File System
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Elevation of Privilege
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation More Likely;Older Software Release:Exploitation More Likely;DOS:N/A
Reference: https://catalog.update.microsoft.com/v7/
msrc
CVE-2022-21971HIGHCVSS 7.8KEV2022-02-08
CVE-2022-21971 [HIGH] Windows Runtime Remote Code Execution Vulnerability
Windows Runtime Remote Code Execution Vulnerability
FAQ: According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution?
The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally.
For example, when the score indicates tha
msrc
CVE-2022-21994HIGHCVSS 7.82022-02-08
CVE-2022-21994 [HIGH] Windows DWM Core Library Elevation of Privilege Vulnerability
Windows DWM Core Library Elevation of Privilege Vulnerability
Windows DWM Core Library: Windows DWM Core Library
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Elevation of Privilege
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation More Likely;Older Software Release:Exploitation More Likely;DOS:N/A
Reference: https://catalog.update.microsoft.com/v7/site/Sea
msrc
CVE-2022-21992HIGHCVSS 7.82022-02-08
CVE-2022-21992 [HIGH] Windows Mobile Device Management Remote Code Execution Vulnerability
Windows Mobile Device Management Remote Code Execution Vulnerability
FAQ: According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution?
The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally.
For exa
msrc
CVE-2022-22712MEDIUMCVSS 5.62022-02-08
CVE-2022-22712 [MEDIUM] Windows Hyper-V Denial of Service Vulnerability
Windows Hyper-V Denial of Service Vulnerability
FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?
Successful exploitation of this vulnerability requires an attacker to take additional actions prior to exploitation to prepare the target environment.
FAQ: According to the CVSS metric, a successful exploitation could lead to a scope change (S:C). What does thi
msrc
CVE-2022-21849CRITICALCVSS 9.82022-01-11
CVE-2022-21849 [CRITICAL] Windows Internet Key Exchange (IKE) Protocol Extensions Remote Code Execution Vulnerability
Windows Internet Key Exchange (IKE) Protocol Extensions Remote Code Execution Vulnerability
FAQ: How could an attacker exploit this vulnerability?
In an environment where Internet Key Exchange (IKE) version 2 is enabled, a remote attacker could trigger multiple vulnerabilities without being authenticated.
Windows IKE Extension: Windows IKE Extension
Microsoft: Microsoft
Custo
msrc
CVE-2021-22947CRITICALCVSS 5.92022-01-11
CVE-2021-22947 [MEDIUM] Open Source Curl Remote Code Execution Vulnerability
Open Source Curl Remote Code Execution Vulnerability
FAQ: Why is this a Hacker One CVE?
This CVE is regarding a vulnerability in the curl open source library which is used by Windows. The January 2022 Windows Security Updates includes the most recent version of this library which addresses the vulnerability and others. Please see curl security problems for information on all of the vulnerabilities that have been addres
msrc
CVE-2022-21907CRITICALCVSS 9.8PoC2022-01-11
CVE-2022-21907 [CRITICAL] HTTP Protocol Stack Remote Code Execution Vulnerability
HTTP Protocol Stack Remote Code Execution Vulnerability
FAQ: How could an attacker exploit this vulnerability?
In most situations, an unauthenticated attacker could send a specially crafted packet to a targeted server utilizing the HTTP Protocol Stack (http.sys) to process packets.
Is this wormable?
Yes. Microsoft recommends prioritizing the patching of affected servers.
FAQ: Windows 10, Version 1909 is not in th
msrc
CVE-2022-21901CRITICALCVSS 9.02022-01-11
CVE-2022-21901 [CRITICAL] Windows Hyper-V Elevation of Privilege Vulnerability
Windows Hyper-V Elevation of Privilege Vulnerability
FAQ: How could an attacker exploit this vulnerability?
An authenticated attacker could run a specially crafted application on a vulnerable Hyper-V guest to exploit this vulnerability which, if successful, could potentially interact with processes of another Hyper-V guest hosted on the same Hyper-V host.
Role: Windows Hyper-V: Role: Windows Hyper-V
Microsoft: Micr
msrc
CVE-2022-21881HIGHCVSS 7.02022-01-11
CVE-2022-21881 [HIGH] Windows Kernel Elevation of Privilege Vulnerability
Windows Kernel Elevation of Privilege Vulnerability
Windows Kernel: Windows Kernel
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Elevation of Privilege
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation More Likely;Older Software Release:Exploitation More Likely
Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5009557
Reference: https://support
msrc
CVE-2022-21861HIGHCVSS 7.02022-01-11
CVE-2022-21861 [HIGH] Task Flow Data Engine Elevation of Privilege Vulnerability
Task Flow Data Engine Elevation of Privilege Vulnerability
Windows Task Flow Data Engine: Windows Task Flow Data Engine
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Elevation of Privilege
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely
Reference: https://catalog.update.microsoft.com/v7/site/Search.
msrc
CVE-2022-21860HIGHCVSS 7.02022-01-11
CVE-2022-21860 [HIGH] Windows AppContracts API Server Elevation of Privilege Vulnerability
Windows AppContracts API Server Elevation of Privilege Vulnerability
Windows AppContracts API Server: Windows AppContracts API Server
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Elevation of Privilege
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely
Reference: https://catalog.update.micro
msrc
CVE-2022-21859HIGHCVSS 7.02022-01-11
CVE-2022-21859 [HIGH] Windows Accounts Control Elevation of Privilege Vulnerability
Windows Accounts Control Elevation of Privilege Vulnerability
Windows Account Control: Windows Account Control
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Elevation of Privilege
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely
Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q
msrc
CVE-2022-21871HIGHCVSS 7.02022-01-11
CVE-2022-21871 [HIGH] Microsoft Diagnostics Hub Standard Collector Runtime Elevation of Privilege Vulnerability
Microsoft Diagnostics Hub Standard Collector Runtime Elevation of Privilege Vulnerability
Windows Diagnostic Hub: Windows Diagnostic Hub
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Elevation of Privilege
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely
Reference: http
msrc
CVE-2022-21866HIGHCVSS 7.02022-01-11
CVE-2022-21866 [HIGH] Windows System Launcher Elevation of Privilege Vulnerability
Windows System Launcher Elevation of Privilege Vulnerability
Windows System Launcher: Windows System Launcher
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Elevation of Privilege
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely
Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=K
msrc