Microsoft Vulnerability Severity Classification for Windows
Our commitment to protecting customers from vulnerabilities in our software, services, and devices includes providing security updates and guidance that address those vulnerabilities when they are reported to Microsoft. We want to be transparent with our customers and security researchers in our approach. The information listed in this bug bar is used by the Microsoft Security Response Center (MSRC) to triage bugs and determine bug severity in terms of security.
When a vulnerability in one class (e.g. EOP) can be combined with By-Design behavior to achieve higher class vulnerability (e.g. RCE), the vulnerability is rated at the higher class.
The ratings are derived from MSRC advisory rating classifications. This bug bar describes different severities for client software (defined as software that runs locally on a single computer or software that accesses shared resources provided by a server over a network) and server software (computers configured to run software that await and fulfill requests from client processes running on other computers).
Server – Severity Pivot
The server bar is usually not appropriate when user interaction is part of the exploitation process. If a Critical vulnerability exists only on our server products and is exploited in a way that requires user interaction and results in the compromise of the server, the severity may be reduced from Critical to Important in accordance with the definition of extensive user interaction presented at the start of the client severity pivot.
| Severity | Vulnerability Types |
|---|---|
| Critical |
Summary: (Server) – “Network Worms or unavoidable cases where the server is “compromised”
|
| Important |
Summary: (Server) – “Non-default critical scenarios or cases where mitigations exist that can help prevent critical scenarios.”
|
| Moderate |
|
| Low |
|
Client – Severity Pivot
Extensive user interaction is explained as follows:
- “User interaction” usually happens in client scenarios
- Normal, simple user actions like clicking links, previewing mail (including attachments), viewing local folders or file shares, opening a file (without any warning dialog) are not “extensive user interaction”
- Extensive: User manually navigating to a particular web site (ex: typing in URL) or clicking through one or more decision dialogs
- NOT Extensive: User clicking through email links
Clarification: Note that the effect of “extensive user interaction” is not “one level reduction in severity,” but is and has been “a reduction in severity in certain circumstances” where the phrase “extensive user interaction” appears in the bug bar. The intent is to help differentiate fast spreading and wormable from those where, because the user interacts, the attack is slowed down. This bug bar does not allow us to reduce Elevation of Privilege below Important because of user interaction.
| Severity | Vulnerability Types |
|---|---|
| Critical |
Summary: (Client) – “Network Worms, or unavoidable common browsing/use scenarios where client is compromised without warnings or prompts.
|
| Important |
Summary: (Client) – “Common browsing/use scenarios where client is compromised with warnings or prompts, or via extensive actions without prompts.” Note that this does not discriminate over the quality/usability of a prompt and likelihood a user might click through the prompt, but just that a prompt of some form exists.
|
| Moderate |
|
| Low |
|
REVISION HISTORY
- March 10, 2025: Bug bar migration to MSRC publishing platform. Additional clarification added to Server - Important Denial of Service definitions
- June 12, 2025: Authentication relay scenarios added to Important and Moderate Spoofing