Microsoft Windows

Operating Systems

Period: 7d 14d 30d 90d
451
Open CVEs
2
Exploited
2
KEV
258
Unpatched
15
No Workaround
117
Internet-facing

Why this provider is risky now

This provider has 451 open CVE(s) in the last 90 days. 2 listed in CISA KEV (known exploited). 258 have no vendor patch. 117 affect internet-facing services. 53 impact the management/identity plane.

2 KEV 2 Exploited 258 Unpatched 53 Mgmt / Admin Plane 58 Public PoC 15 No Workaround 117 Internet-facing

Top Risky CVEs

CVE-2026-21510
Act Now
Unpatched
Windows Shell contains a protection mechanism failure (CVE-2026-21510, CVSS 8.8) that allows unauthenticated remote attackers to bypass security features over a network. KEV-listed, this vulnerability in the core Windows Shell component enables remote code execution by circumventing security boundaries designed to prevent execution of untrusted content received from the network.
Within 24 hours: Inventory all Windows systems and identify those running vulnerable Shell versions; disable Windows Shell features where operationally feasible and implement network segmentation to restrict Shell access. Within 7 days: Deploy enhanced monitoring and EDR solutions to detect exploitation attempts; establish daily patch status reviews; brief security and IT leadership on mitigation status. Within 30 days: Apply vendor patch immediately upon release; conduct forensic analysis of systems for signs of prior compromise; review and strengthen network access controls and authentication mechanisms.
ICT dependency Active exploitation No patch available KEV PoC
Why flagged?
NIS2 Relevant
  • HIGH severity
  • Third-party ICT: Microsoft Windows
  • Exploited in the wild (CISA KEV)
  • No patch available
  • Strong evidence (KEV / high EPSS / multi-source)
DORA Relevant
  • HIGH severity
  • ICT provider: Microsoft Windows (Operating Systems)
  • Known exploited vulnerability (KEV)
  • No remediation available
8.8
CVSS
3.8%
EPSS
98
Priority
CVE-2026-21519
Act Now
Unpatched
Desktop Window Manager (DWM) in Windows contains a type confusion vulnerability (CVE-2026-21519, CVSS 7.8) that enables authorized local attackers to escalate privileges. KEV-listed, this kernel-level vulnerability in the Windows compositor allows any authenticated user to achieve SYSTEM-level access through exploitation of an incompatible type access in DWM's resource handling.
Within 24 hours: Inventory all Windows systems running affected DWM versions and assess exposure in high-value environments (domain controllers, servers, sensitive workstations). Within 7 days: Implement compensating controls including strict user access policies, disable unnecessary local login capabilities, and enforce application whitelisting where feasible. Within 30 days: Maintain continuous vendor monitoring for patch availability and prepare expedited deployment procedures; escalate to Windows/Microsoft stakeholders to request hotfix timelines.
ICT dependency Active exploitation No patch available KEV
Why flagged?
NIS2 Relevant
  • HIGH severity
  • Third-party ICT: Microsoft Windows
  • Exploited in the wild (CISA KEV)
  • No patch available
  • Strong evidence (KEV / high EPSS / multi-source)
DORA Relevant
  • HIGH severity
  • ICT provider: Microsoft Windows (Operating Systems)
  • Known exploited vulnerability (KEV)
  • No remediation available
7.8
CVSS
3.1%
EPSS
92
Priority
CVE-2019-25365
Act Now
Unpatched
Buffer overflow in ChaosPro 2.0 fractal generator via configuration file path handling allows code execution through crafted configuration files. PoC available.
Within 24 hours: Identify all systems running ChaosPro 2.0 and isolate them from production networks if possible; disable the application if not business-critical. Within 7 days: Implement network segmentation to restrict access to ChaosPro instances and implement file integrity monitoring on configuration directories. Within 30 days: Evaluate migration to alternative solutions or obtain vendor security updates; if ChaosPro remains in use, establish continuous monitoring for exploitation attempts.
Edge exposure ICT dependency No patch available PoC
Why flagged?
NIS2 Relevant
  • CRITICAL severity
  • Internet-facing technique: rce
  • Third-party ICT: Microsoft Windows
  • Proof of concept available
  • No patch available
  • Moderate evidence (PoC / elevated EPSS)
DORA Relevant
  • CRITICAL severity
  • ICT provider: Microsoft Windows (Operating Systems)
  • No remediation available
9.8
CVSS
0.2%
EPSS
69
Priority
CVE-2020-37000
Act Now
Unpatched
Stack buffer overflow in Free MP3 CD Ripper 2.8 allows remote code execution via crafted WAV files. PoC available.
Within 24 hours: Identify all systems running Free MP3 CD Ripper 2.8 and isolate them from production networks or disable the application immediately. Within 7 days: Evaluate alternative MP3 CD ripping solutions and develop migration plan; conduct forensic analysis for signs of exploitation. Within 30 days: Complete migration off vulnerable software; deploy network controls to block WAV file delivery to remaining systems if migration is delayed.
Edge exposure ICT dependency No patch available PoC
Why flagged?
NIS2 Relevant
  • CRITICAL severity
  • Internet-facing technique: rce
  • Third-party ICT: Microsoft Windows
  • Proof of concept available
  • No patch available
  • Moderate evidence (PoC / elevated EPSS)
DORA Relevant
  • CRITICAL severity
  • ICT provider: Microsoft Windows (Operating Systems)
  • No remediation available
9.8
CVSS
0.1%
EPSS
69
Priority
CVE-2026-25952
Act Now
Use-after-free in FreeRDP xf_SetWindowMinMaxInfo before version 3.23.0. X11 client window management triggers memory corruption. PoC and patch available.
Within 24 hours: Identify all systems running FreeRDP and assess exposure; isolate or restrict network access to affected servers if patching cannot be completed immediately. Within 7 days: Apply the available vendor patch to all FreeRDP installations and verify successful deployment. Within 30 days: Conduct vulnerability rescans and review access logs for signs of exploitation.
ICT dependency PoC Patched
Why flagged?
NIS2 Relevant
  • CRITICAL severity
  • Third-party ICT: Red Hat, SUSE, Microsoft Windows
  • Proof of concept available
  • Moderate evidence (PoC / elevated EPSS)
DORA Relevant
  • CRITICAL severity
  • ICT provider: Red Hat (Infrastructure & Virtualization)
  • ICT provider: SUSE (Infrastructure & Virtualization)
  • ICT provider: Microsoft Windows (Operating Systems)
9.8
CVSS
0.1%
EPSS
69
Priority
CVE-2020-37181
Act Now
Unpatched
Stack overflow in Torrent FLV Converter 1.51 Build 117 via SEH overwrite. PoC available.
Within 24 hours: Inventory all systems running Torrent FLV Converter 1.51 Build 117 and isolate them from production networks if possible. Within 7 days: Disable the software across the organization or restrict access to trusted personnel only; contact the vendor for patch availability and timeline. Within 30 days: Either upgrade to a patched version once available or migrate to an alternative FLV conversion solution with active security support.
ICT dependency No patch available PoC
Why flagged?
NIS2 Relevant
  • CRITICAL severity
  • Third-party ICT: Microsoft Windows
  • Proof of concept available
  • No patch available
  • Moderate evidence (PoC / elevated EPSS)
DORA Relevant
  • CRITICAL severity
  • ICT provider: Microsoft Windows (Operating Systems)
  • No remediation available
9.8
CVSS
0.1%
EPSS
69
Priority
CVE-2026-26064
This Week
Remote code execution in Calibre 9.2.1 and earlier allows authenticated users to write arbitrary files via a path traversal flaw in the extract_pictures() function that fails to properly sanitize directory traversal sequences. On Windows systems, attackers can exploit this to write malicious payloads to the Startup folder, achieving code execution upon the next user login. Public exploit code exists for this vulnerability, and a patch is available in version 9.3.0.
Within 24 hours: Identify all systems running Calibre 9.2.1 or below and assess their network exposure and user access levels. Within 7 days: Apply the available vendor patch to all affected instances and verify successful deployment. Within 30 days: Conduct a security audit to confirm patch compliance across the environment and review access logs for any suspicious file write activities during the vulnerability window.
Edge exposure ICT dependency PoC Patched
Why flagged?
NIS2 Relevant
  • HIGH severity
  • Internet-facing (CWE-22: Path Traversal)
  • Third-party ICT: SUSE, Microsoft Windows
  • Proof of concept available
  • Moderate evidence (PoC / elevated EPSS)
DORA Relevant
  • HIGH severity
  • ICT provider: SUSE (Infrastructure & Virtualization)
  • ICT provider: Microsoft Windows (Operating Systems)
8.8
CVSS
0.1%
EPSS
64
Priority
CVE-2026-25635
This Week
Remote code execution in Calibre prior to version 9.2.0 through a path traversal flaw in the CHM reader allows local attackers to write arbitrary files with user permissions, enabling payload execution via the Windows Startup folder. Public exploit code exists for this vulnerability. Windows users should upgrade to Calibre 9.2.0 or later to remediate the risk.
Within 24 hours: Identify all systems running Calibre versions prior to 9.2.0 using asset inventory tools and disable CHM file handling if not business-critical. Within 7 days: Deploy Calibre 9.2.0 or later across all affected systems; prioritize user-facing and shared systems first. Within 30 days: Complete patch deployment across the entire environment and verify through vulnerability scanning.
Edge exposure ICT dependency PoC Patched
Why flagged?
NIS2 Relevant
  • HIGH severity
  • Internet-facing (CWE-22: Path Traversal)
  • Third-party ICT: Red Hat, SUSE, Microsoft Windows
  • Proof of concept available
  • Moderate evidence (PoC / elevated EPSS)
DORA Relevant
  • HIGH severity
  • ICT provider: Red Hat (Infrastructure & Virtualization)
  • ICT provider: SUSE (Infrastructure & Virtualization)
  • ICT provider: Microsoft Windows (Operating Systems)
8.6
CVSS
0.2%
EPSS
63
Priority
CVE-2021-47881
This Week
Unpatched
dataSIMS Avionics ARINC 664-1 version 4.5.3 contains a local buffer overflow vulnerability that allows attackers to overwrite memory by manipulating the milstd1553result.txt file. [CVSS 8.4 HIGH]
Within 24 hours: Identify all systems running dataSIMS Avionics version 4.5.3 and assess which are directly exposed to untrusted users; implement strict file access controls on milstd1553result.txt (read-only permissions, restricted ownership). Within 7 days: Isolate affected avionics systems to network segments with minimal lateral movement capability; enable file integrity monitoring and access logging on milstd1553result.txt; contact dataSIMS for patch timeline and interim guidance. Within 30 days: Deploy compensating controls including application sandboxing or containerization; evaluate upgrade feasibility to patched version when released; conduct vulnerability scan of dependent systems.
ICT dependency No patch available PoC
Why flagged?
NIS2 Relevant
  • HIGH severity
  • Third-party ICT: Microsoft Windows
  • Proof of concept available
  • No patch available
  • Moderate evidence (PoC / elevated EPSS)
DORA Relevant
  • HIGH severity
  • ICT provider: Microsoft Windows (Operating Systems)
  • No remediation available
8.4
CVSS
0.0%
EPSS
62
Priority
CVE-2020-37025
This Week
Unpatched
Port Forwarding Wizard 4.8.0 contains a buffer overflow vulnerability that allows local attackers to execute arbitrary code through a long request in the Register feature. [CVSS 8.4 HIGH]
Within 24 hours: Inventory all systems running Port Forwarding Wizard 4.8.0 and restrict access to the Register feature via network segmentation or firewall rules. Within 7 days: Disable the Register feature if operationally feasible, or implement strict input validation and monitoring on vulnerable endpoints. Within 30 days: Evaluate vendor patch availability, migrate to a patched version, or consider alternative software solutions.
ICT dependency No patch available PoC
Why flagged?
NIS2 Relevant
  • HIGH severity
  • Third-party ICT: Microsoft Windows
  • Proof of concept available
  • No patch available
  • Moderate evidence (PoC / elevated EPSS)
DORA Relevant
  • HIGH severity
  • ICT provider: Microsoft Windows (Operating Systems)
  • No remediation available
8.4
CVSS
0.0%
EPSS
62
Priority

By Exposure

Internet-facing
117
Mgmt / Admin Plane
53
Identity / Auth
28
Internal only
306

By Exploitability

Known exploited
2
Public PoC
58
High EPSS (>30%)
0
Remote unauthenticated
81
Local only
282

By Remediation

Patch available
193
No patch
258
Workaround available
381
No workaround
15

Affected Services / Product Families

Windows
314 CVE(s)
CVE-2026-21672 HIGH Unpatched
CVE-2026-0903 MEDIUM Patched
CVE-2025-33229 HIGH Patched
CVE-2025-33231 MEDIUM Patched
CVE-2025-58740 MEDIUM Unpatched
CVE-2025-58742 MEDIUM Unpatched
CVE-2025-58743 HIGH Unpatched
CVE-2025-58744 HIGH Unpatched
CVE-2026-21986 HIGH Unpatched
CVE-2026-24016 HIGH Unpatched
+ 304 more
Windows Server 2025
180 CVE(s)
CVE-2026-23671 HIGH Unpatched
CVE-2026-23672 HIGH Unpatched
CVE-2026-23673 HIGH Unpatched
CVE-2026-23674 HIGH Unpatched
CVE-2026-24283 HIGH Unpatched
CVE-2026-24285 HIGH Unpatched
CVE-2026-24287 HIGH Unpatched
CVE-2026-24289 HIGH Unpatched
CVE-2026-24290 HIGH Unpatched
CVE-2026-24291 HIGH Unpatched
+ 170 more
Windows Server 2022
173 CVE(s)
CVE-2026-23668 HIGH Unpatched
CVE-2026-23671 HIGH Unpatched
CVE-2026-23672 HIGH Unpatched
CVE-2026-23673 HIGH Unpatched
CVE-2026-23674 HIGH Unpatched
CVE-2026-24285 HIGH Unpatched
CVE-2026-24287 HIGH Unpatched
CVE-2026-24289 HIGH Unpatched
CVE-2026-24290 HIGH Unpatched
CVE-2026-24291 HIGH Unpatched
+ 163 more
Windows Server 2019
159 CVE(s)
CVE-2026-23668 HIGH Unpatched
CVE-2026-23671 HIGH Unpatched
CVE-2026-23672 HIGH Unpatched
CVE-2026-23673 HIGH Unpatched
CVE-2026-23674 HIGH Unpatched
CVE-2026-24285 HIGH Unpatched
CVE-2026-24287 HIGH Unpatched
CVE-2026-24289 HIGH Unpatched
CVE-2026-24290 HIGH Unpatched
CVE-2026-24291 HIGH Unpatched
+ 149 more
Windows Server 2016
133 CVE(s)
CVE-2026-23668 HIGH Unpatched
CVE-2026-23671 HIGH Unpatched
CVE-2026-23672 HIGH Unpatched
CVE-2026-23673 HIGH Unpatched
CVE-2026-23674 HIGH Unpatched
CVE-2026-24285 HIGH Unpatched
CVE-2026-24289 HIGH Unpatched
CVE-2026-24291 HIGH Unpatched
CVE-2026-24295 HIGH Unpatched
CVE-2026-24296 HIGH Unpatched
+ 123 more
Windows Server 2012
95 CVE(s)
CVE-2026-23668 HIGH Unpatched
CVE-2026-23672 HIGH Unpatched
CVE-2026-23673 HIGH Unpatched
CVE-2026-23674 HIGH Unpatched
CVE-2026-24285 HIGH Unpatched
CVE-2026-24289 HIGH Unpatched
CVE-2026-24291 HIGH Unpatched
CVE-2026-24296 HIGH Unpatched
CVE-2026-24297 MEDIUM Unpatched
CVE-2026-25165 HIGH Unpatched
+ 85 more
Windows Admin Center
3 CVE(s)
CVE-2026-23660 HIGH Unpatched
CVE-2026-26119 HIGH Patched
CVE-2026-32196 MEDIUM Patched

Recommended Actions

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy