CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:C/I:C/A:C
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
AI Score
Confidence
Low
EPSS
Percentile
99.3%
Multiple vulnerabilities were found in Microsoft Windows. Malicious users can exploit these vulnerabilities to bypass security restrictions, gain privileges, execute arbitrary code, obtain sensitive information.
Below is a complete list of vulnerabilities:
Public exploits exist for this vulnerability.
Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.
CVE-2018-8320 warning
CVE-2018-8333 high
CVE-2018-8423 critical
CVE-2018-8432 critical
CVE-2018-8486 high
CVE-2018-8330 high
CVE-2018-8493 critical
CVE-2018-8472 high
CVE-2018-8492 high
CVE-2018-8481 warning
CVE-2018-8482 warning
CVE-2018-8506 high
CVE-2018-8490 critical
CVE-2018-8413 critical
CVE-2018-8329 critical
CVE-2018-8453 critical
CVE-2018-8411 critical
CVE-2018-8494 critical
CVE-2018-8495 critical
CVE-2018-8484 critical
CVE-2018-8489 critical
CVE-2018-8497 critical
Install necessary updates from the KB section, that are listed in your Windows Update (Windows Update usually can be accessed from the Control Panel)
Arbitrary code execution. Exploitation of vulnerabilities with this impact can lead to executing by abuser any code or commands at vulnerable machine or process.
Obtain sensitive information. Exploitation of vulnerabilities with this impact can lead to capturing by abuser information, critical for user or system.
Security bypass. Exploitation of vulnerabilities with this impact can lead to performing actions restricted by current security settings.
Privilege escalation. Exploitation of vulnerabilities with this impact can lead to performing by abuser actions, which are normally disallowed for current role.
support.microsoft.com/kb/4462917
support.microsoft.com/kb/4462918
support.microsoft.com/kb/4462919
support.microsoft.com/kb/4462922
support.microsoft.com/kb/4462926
support.microsoft.com/kb/4462929
support.microsoft.com/kb/4462931
support.microsoft.com/kb/4462937
support.microsoft.com/kb/4462941
support.microsoft.com/kb/4464330
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-8320
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-8329
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-8330
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-8333
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-8411
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-8413
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-8423
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-8432
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-8453
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-8472
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-8481
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-8482
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-8484
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-8486
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-8489
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-8490
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-8492
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-8493
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-8494
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-8495
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-8497
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-8506
statistics.securelist.com/
threats.kaspersky.com/en/class/Exploit/
threats.kaspersky.com/en/product/Microsoft-Windows-10/
threats.kaspersky.com/en/product/Microsoft-Windows-7/
threats.kaspersky.com/en/product/Microsoft-Windows-8/
threats.kaspersky.com/en/product/Microsoft-Windows-Server-2008/
threats.kaspersky.com/en/product/Microsoft-Windows-Server-2012/
threats.kaspersky.com/en/product/Microsoft-Windows-Server/
threats.kaspersky.com/en/product/Microsoft-Windows/
threats.kaspersky.com/en/product/Microsoft-Word/
threats.kaspersky.com/en/product/Windows-RT/
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:C/I:C/A:C
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
AI Score
Confidence
Low
EPSS
Percentile
99.3%