10 High
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:C/I:C/A:C
9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.4 High
AI Score
Confidence
High
0.799 High
EPSS
Percentile
98.3%
Multiple vulnerabilities were found in Microsoft Windows. Malicious users can exploit these vulnerabilities to execute arbitrary code, obtain sensitive information, cause denial of service, gain privileges, bypass security restrictions.
Below is a complete list of vulnerabilities:
Public exploits exist for this vulnerability.
Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.
CVE-2017-11762 critical
CVE-2017-11763 critical
CVE-2017-11765 high
CVE-2017-11769 critical
CVE-2017-11771 critical
CVE-2017-11772 critical
CVE-2017-11779 critical
CVE-2017-11780 high
CVE-2017-11781 critical
CVE-2017-11782 critical
CVE-2017-11783 high
CVE-2017-11784 high
CVE-2017-11785 high
CVE-2017-11814 high
CVE-2017-11815 high
CVE-2017-11816 high
CVE-2017-11817 warning
CVE-2017-11818 warning
CVE-2017-11823 high
CVE-2017-11824 high
CVE-2017-11829 high
CVE-2017-8689 high
CVE-2017-8693 high
CVE-2017-8694 high
CVE-2017-8703 high
CVE-2017-8715 high
CVE-2017-8717 critical
CVE-2017-8718 critical
CVE-2017-8727 critical
Install necessary updates from the KB section, that are listed in your Windows Update (Windows Update usually can be accessed from the Control Panel)
Arbitrary code execution. Exploitation of vulnerabilities with this impact can lead to executing by abuser any code or commands at vulnerable machine or process.
Obtain sensitive information. Exploitation of vulnerabilities with this impact can lead to capturing by abuser information, critical for user or system.
Denial of service. Exploitation of vulnerabilities with this impact can lead to loss of system availability or critical functional fault.
Security bypass. Exploitation of vulnerabilities with this impact can lead to performing actions restricted by current security settings.
Privilege escalation. Exploitation of vulnerabilities with this impact can lead to performing by abuser actions, which are normally disallowed for current role.
support.microsoft.com/kb/4038793
support.microsoft.com/kb/4041676
support.microsoft.com/kb/4041679
support.microsoft.com/kb/4041687
support.microsoft.com/kb/4041689
support.microsoft.com/kb/4041690
support.microsoft.com/kb/4041691
support.microsoft.com/kb/4041693
support.microsoft.com/kb/4042895
support.microsoft.com/kb/4048955
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2017-11762
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2017-11763
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2017-11765
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2017-11769
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2017-11771
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2017-11772
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2017-11779
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2017-11780
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2017-11781
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2017-11782
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2017-11783
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2017-11784
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2017-11785
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2017-11814
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2017-11815
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2017-11816
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2017-11817
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2017-11818
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2017-11823
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2017-11824
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2017-11829
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2017-8689
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2017-8693
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2017-8694
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2017-8703
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2017-8715
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2017-8717
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2017-8718
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2017-8727
portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV170012
portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV170014
statistics.securelist.com/
threats.kaspersky.com/en/class/Exploit/
threats.kaspersky.com/en/product/Microsoft-Windows-10/
threats.kaspersky.com/en/product/Microsoft-Windows-7/
threats.kaspersky.com/en/product/Microsoft-Windows-8/
threats.kaspersky.com/en/product/Microsoft-Windows-Server-2008/
threats.kaspersky.com/en/product/Microsoft-Windows-Server-2012/
threats.kaspersky.com/en/product/Microsoft-Windows-Server/
threats.kaspersky.com/en/product/Microsoft-Windows/
threats.kaspersky.com/en/product/Windows-RT/
10 High
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:C/I:C/A:C
9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.4 High
AI Score
Confidence
High
0.799 High
EPSS
Percentile
98.3%