10 High
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:C/I:C/A:C
5 Medium
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N
8.9 High
AI Score
Confidence
High
0.975 High
EPSS
Percentile
100.0%
Multiple vulnerabilities were found in Microsoft Windows. Malicious users can exploit these vulnerabilities to bypass security restrictions, obtain sensitive information, gain privileges, execute arbitrary code.
Below is a complete list of vulnerabilities:
The following public exploits exists for this vulnerability:
https://www.exploit-db.com/exploits/42235
https://www.exploit-db.com/exploits/42212
https://www.exploit-db.com/exploits/42223
https://www.exploit-db.com/exploits/42429
https://www.exploit-db.com/exploits/42382
https://www.exploit-db.com/exploits/42236
https://www.exploit-db.com/exploits/42224
https://www.exploit-db.com/exploits/42225
https://www.exploit-db.com/exploits/42243
https://www.exploit-db.com/exploits/42234
https://www.exploit-db.com/exploits/42237
https://www.exploit-db.com/exploits/42226
https://www.exploit-db.com/exploits/42239
https://www.exploit-db.com/exploits/42241
https://www.exploit-db.com/exploits/42240
Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.
CVE-2017-8543 critical
CVE-2017-0219 warning
CVE-2017-0284 warning
CVE-2017-0218 warning
CVE-2017-0215 warning
CVE-2017-0193 warning
CVE-2017-8488 unknown
CVE-2017-8528 critical
CVE-2017-8460 warning
CVE-2017-8475 warning
CVE-2017-8470 warning
CVE-2017-8466 high
CVE-2017-8464 critical
CVE-2017-0291 critical
CVE-2017-0216 warning
CVE-2017-0292 critical
CVE-2017-0285 warning
CVE-2017-8471 warning
CVE-2017-0173 warning
CVE-2017-0294 critical
CVE-2017-8472 warning
CVE-2017-8483 unknown
CVE-2017-0283 unknown
CVE-2017-0282 warning
CVE-2017-0296 high
CVE-2017-8473 warning
CVE-2017-0287 warning
CVE-2017-0288 warning
CVE-2017-0289 warning
CVE-2017-8527 critical
CVE-2017-8531 warning
CVE-2017-8532 warning
CVE-2017-8533 warning
Install necessary updates from the KB section, that are listed in your Windows Update (Windows Update usually can be accessed from the Control Panel)
Arbitrary code execution. Exploitation of vulnerabilities with this impact can lead to executing by abuser any code or commands at vulnerable machine or process.
Obtain sensitive information. Exploitation of vulnerabilities with this impact can lead to capturing by abuser information, critical for user or system.
Security bypass. Exploitation of vulnerabilities with this impact can lead to performing actions restricted by current security settings.
Privilege escalation. Exploitation of vulnerabilities with this impact can lead to performing by abuser actions, which are normally disallowed for current role.
support.microsoft.com/kb/4022714
support.microsoft.com/kb/4022715
support.microsoft.com/kb/4022727
support.microsoft.com/kb/4025339
support.microsoft.com/kb/4025342
support.microsoft.com/kb/4034658
support.microsoft.com/kb/4034660
support.microsoft.com/kb/4034665
support.microsoft.com/kb/4034666
support.microsoft.com/kb/4034668
support.microsoft.com/kb/4034672
support.microsoft.com/kb/4034674
support.microsoft.com/kb/4034681
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2017-0173
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2017-0193
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2017-0215
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2017-0216
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2017-0218
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2017-0219
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2017-0282
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2017-0283
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2017-0284
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2017-0285
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2017-0287
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2017-0288
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2017-0289
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2017-0291
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2017-0292
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2017-0294
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2017-0296
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2017-8460
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2017-8464
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2017-8466
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2017-8470
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2017-8471
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2017-8472
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2017-8473
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2017-8475
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2017-8483
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2017-8488
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2017-8527
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2017-8528
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2017-8531
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2017-8532
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2017-8533
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2017-8543
statistics.securelist.com/
threats.kaspersky.com/en/class/Exploit/
threats.kaspersky.com/en/product/Microsoft-Windows-10/
threats.kaspersky.com/en/product/Microsoft-Windows-7/
threats.kaspersky.com/en/product/Microsoft-Windows-8/
threats.kaspersky.com/en/product/Microsoft-Windows-Server-2008/
threats.kaspersky.com/en/product/Microsoft-Windows-Server-2012/
threats.kaspersky.com/en/product/Microsoft-Windows-Server/
threats.kaspersky.com/en/product/Microsoft-Windows/
threats.kaspersky.com/en/product/Microsoft-Word/
threats.kaspersky.com/en/product/Windows-RT/
www.exploit-db.com/exploits/42212
www.exploit-db.com/exploits/42223
www.exploit-db.com/exploits/42224
www.exploit-db.com/exploits/42225
www.exploit-db.com/exploits/42226
www.exploit-db.com/exploits/42234
www.exploit-db.com/exploits/42235
www.exploit-db.com/exploits/42236
www.exploit-db.com/exploits/42237
www.exploit-db.com/exploits/42239
www.exploit-db.com/exploits/42240
www.exploit-db.com/exploits/42241
www.exploit-db.com/exploits/42243
www.exploit-db.com/exploits/42382
www.exploit-db.com/exploits/42429
10 High
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:C/I:C/A:C
5 Medium
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N
8.9 High
AI Score
Confidence
High
0.975 High
EPSS
Percentile
100.0%