9.3 High
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:C/I:C/A:C
8.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
9.3 High
AI Score
Confidence
Low
0.968 High
EPSS
Percentile
99.7%
Multiple vulnerabilities were found in Microsoft Windows. Malicious users can exploit these vulnerabilities to obtain sensitive information, gain privileges, cause denial of service, execute arbitrary code, bypass security restrictions.
Below is a complete list of vulnerabilities:
Public exploits exist for this vulnerability.
Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.
CVE-2018-8433 warning
CVE-2018-8462 critical
CVE-2018-8442 high
CVE-2018-8440 critical
CVE-2018-8438 high
CVE-2018-8455 critical
CVE-2018-8392 critical
CVE-2018-8410 critical
CVE-2018-8335 critical
CVE-2018-8444 high
CVE-2018-8441 critical
CVE-2018-8332 critical
CVE-2018-0965 critical
CVE-2018-8271 high
CVE-2018-8437 high
CVE-2018-8443 high
CVE-2018-8475 critical
CVE-2018-8419 high
CVE-2018-8434 high
CVE-2018-8420 critical
CVE-2018-8436 high
CVE-2018-8439 critical
CVE-2018-8449 warning
CVE-2018-8435 warning
CVE-2018-8424 high
CVE-2018-8468 warning
CVE-2018-8393 critical
CVE-2018-8445 high
CVE-2018-8337 high
CVE-2018-8446 high
Install necessary updates from the KB section, that are listed in your Windows Update (Windows Update usually can be accessed from the Control Panel)
Arbitrary code execution. Exploitation of vulnerabilities with this impact can lead to executing by abuser any code or commands at vulnerable machine or process.
Obtain sensitive information. Exploitation of vulnerabilities with this impact can lead to capturing by abuser information, critical for user or system.
Denial of service. Exploitation of vulnerabilities with this impact can lead to loss of system availability or critical functional fault.
Security bypass. Exploitation of vulnerabilities with this impact can lead to performing actions restricted by current security settings.
Privilege escalation. Exploitation of vulnerabilities with this impact can lead to performing by abuser actions, which are normally disallowed for current role.
support.microsoft.com/kb/4457128
support.microsoft.com/kb/4457129
support.microsoft.com/kb/4457131
support.microsoft.com/kb/4457132
support.microsoft.com/kb/4457135
support.microsoft.com/kb/4457138
support.microsoft.com/kb/4457140
support.microsoft.com/kb/4457142
support.microsoft.com/kb/4457143
support.microsoft.com/kb/4598243
support.microsoft.com/kb/4598275
support.microsoft.com/kb/4598285
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-0965
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-8271
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-8332
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-8335
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-8337
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-8392
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-8393
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-8410
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-8419
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-8420
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-8424
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-8433
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-8434
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-8435
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-8436
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-8437
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-8438
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-8439
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-8440
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-8441
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-8442
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-8443
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-8444
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-8445
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-8446
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-8449
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-8455
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-8462
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-8468
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-8475
portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180022
statistics.securelist.com/
threats.kaspersky.com/en/class/Exploit/
threats.kaspersky.com/en/product/Microsoft-Windows-10/
threats.kaspersky.com/en/product/Microsoft-Windows-7/
threats.kaspersky.com/en/product/Microsoft-Windows-8/
threats.kaspersky.com/en/product/Microsoft-Windows-Server-2008/
threats.kaspersky.com/en/product/Microsoft-Windows-Server-2012/
threats.kaspersky.com/en/product/Microsoft-Windows-Server/
threats.kaspersky.com/en/product/Microsoft-Windows/
threats.kaspersky.com/en/product/Windows-RT/
9.3 High
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:C/I:C/A:C
8.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
9.3 High
AI Score
Confidence
Low
0.968 High
EPSS
Percentile
99.7%