CVE |
Vendors |
Products |
Updated |
CVSS v3.1 |
The Microsoft vulnerable driver block list is implemented as Windows Defender Application Control (WDAC) policy. On systems that do not have hypervisor-protected code integrity (HVCI) enabled, entries that specify only the to-be-signed (TBS) part of the code signer certificate are properly blocked, but entries that specify the signing certificate’s TBS hash along with a 'FileAttribRef' qualifier (such as file name or version) will not be blocked. This vulnerability affects any Windows system that does not have HVCI enabled or supported (HVCI is available in Windows 10, Windows 11, and Windows Server 2016 and later). NOTE: The vendor states that the driver blocklist is intended for use with HVCI, while systems without HVCI should use App Control, and any custom blocklist entries require a granular approach for proper enforcement. |
Time-of-check time-of-use (toctou) race condition in Microsoft Graphics Component allows an authorized attacker to elevate privileges locally. |
Improper access control in Microsoft Windows Search Component allows an authorized attacker to deny service locally. |
Improper access control in Windows Remote Access Connection Manager allows an authorized attacker to elevate privileges locally. |
External control of file name or path in Windows Core Shell allows an unauthorized attacker to perform spoofing over a network. |
Exposure of sensitive information to an unauthorized actor in Windows File Explorer allows an unauthorized attacker to perform spoofing over a network. |
Windows Resilient File System (ReFS) Deduplication Service Elevation of Privilege Vulnerability |
Exposure of sensitive information to an unauthorized actor in Windows Push Notification Core allows an authorized attacker to disclose information locally. |
Out-of-bounds read in Windows MapUrlToZone allows an unauthorized attacker to disclose information over a network. |
Concurrent execution using shared resource with improper synchronization ('race condition') in Microsoft Graphics Component allows an authorized attacker to elevate privileges locally. |
Insertion of sensitive information into log file in Windows StateRepository API allows an authorized attacker to disclose information locally. |
Buffer over-read in Storport.sys Driver allows an authorized attacker to elevate privileges locally. |
Heap-based buffer overflow in Connected Devices Platform Service (Cdpsvc) allows an authorized attacker to elevate privileges locally. |
Improper input validation in Microsoft Windows Search Component allows an unauthorized attacker to deny service locally. |
Use after free in Inbox COM Objects allows an unauthorized attacker to execute code locally. |
Use after free in Windows Remote Desktop allows an unauthorized attacker to execute code locally. |
Use after free in Inbox COM Objects allows an unauthorized attacker to execute code locally. |
Use after free in Inbox COM Objects allows an unauthorized attacker to execute code locally. |
Use after free in Inbox COM Objects allows an unauthorized attacker to execute code locally. |
Use after free in Inbox COM Objects allows an unauthorized attacker to execute code locally. |