4.9 Medium
CVSS2
Attack Vector
LOCAL
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
COMPLETE
AV:L/AC:L/Au:N/C:N/I:N/A:C
7.3 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
6.8 Medium
AI Score
Confidence
High
0.004 Low
EPSS
Percentile
73.5%
Multiple serious vulnerabilities have been found in Microsoft Windows. Malicious users can exploit these vulnerabilities to gain privileges, bypass security restrictions, cause a denial of service, obtain sensitive information and possibly to write local files.
Below is a complete list of vulnerabilities:
Technical details
Exploiting vulnerability (3) can lead to bypassing UEFI (Unified Extensible Firmware Interface) variable security.
NB: Not every vulnerability already have CVSS rating so cumulative CVSS rating can be not representative.
CVE-2017-0295 warning
CVE-2017-0298 warning
CVE-2017-8493 warning
CVE-2017-8515 warning
CVE-2017-8544 warning
CVE-2017-8553 warning
CVE-2017-8554 warning
Install necessary updates from the KB section, that are listed in your Windows Update (Windows Update usually can be accessed from the Control Panel)
Obtain sensitive information. Exploitation of vulnerabilities with this impact can lead to capturing by abuser information, critical for user or system.
Denial of service. Exploitation of vulnerabilities with this impact can lead to loss of system availability or critical functional fault.
Security bypass. Exploitation of vulnerabilities with this impact can lead to performing actions restricted by current security settings.
Write Local Files. Exploitation of vulnerabilities with this impact can lead to writing into some inaccessible files. Files that can be read depends on concrete program errors.
Privilege escalation. Exploitation of vulnerabilities with this impact can lead to performing by abuser actions, which are normally disallowed for current role.
Spoof user interface. Exploitation of vulnerabilities with this impact can lead to changes in user interface to beguile user into inaccurate behavior.
support.microsoft.com/kb/4022714
support.microsoft.com/kb/4022715
support.microsoft.com/kb/4022717
support.microsoft.com/kb/4022718
support.microsoft.com/kb/4022719
support.microsoft.com/kb/4022722
support.microsoft.com/kb/4022724
support.microsoft.com/kb/4022725
support.microsoft.com/kb/4022726
support.microsoft.com/kb/4022727
support.microsoft.com/kb/4022887
support.microsoft.com/kb/4024402
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0295
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0298
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8493
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8515
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8544
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8553
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8554
statistics.securelist.com/
threats.kaspersky.com/en/product/Microsoft-Windows-10/
threats.kaspersky.com/en/product/Microsoft-Windows-7/
threats.kaspersky.com/en/product/Microsoft-Windows-Server-2008/
threats.kaspersky.com/en/product/Microsoft-Windows-Server-2012/
threats.kaspersky.com/en/product/Windows-RT/
4.9 Medium
CVSS2
Attack Vector
LOCAL
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
COMPLETE
AV:L/AC:L/Au:N/C:N/I:N/A:C
7.3 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
6.8 Medium
AI Score
Confidence
High
0.004 Low
EPSS
Percentile
73.5%