9.3 High
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:C/I:C/A:C
7.8 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
8.9 High
AI Score
Confidence
High
0.933 High
EPSS
Percentile
99.1%
Multiple serious vulnerabilities were found in Microsoft Windows. Malicious users can exploit these vulnerabilities to gain privileges, obtain sensitive information and execute arbitrary code.
Below is a complete list of vulnerabilities:
Public exploits exist for this vulnerability.
Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.
CVE-2019-0572 high
CVE-2019-0549 warning
CVE-2019-0570 warning
CVE-2019-0583 critical
CVE-2019-0555 warning
CVE-2019-0543 warning
CVE-2019-0580 critical
CVE-2019-0571 high
CVE-2019-0547 critical
CVE-2019-0574 high
CVE-2019-0550 critical
CVE-2019-0569 warning
CVE-2019-0551 critical
CVE-2019-0553 warning
CVE-2019-0573 high
CVE-2019-0577 critical
CVE-2019-0554 warning
CVE-2019-0581 critical
CVE-2019-0582 critical
CVE-2019-0579 critical
CVE-2019-0536 warning
CVE-2019-0578 critical
CVE-2019-0584 critical
CVE-2019-0552 warning
CVE-2019-0538 critical
CVE-2019-0576 critical
CVE-2019-0575 critical
Install necessary updates from the KB section, that are listed in your Windows Update (Windows Update usually can be accessed from the Control Panel)
Arbitrary code execution. Exploitation of vulnerabilities with this impact can lead to executing by abuser any code or commands at vulnerable machine or process.
Obtain sensitive information. Exploitation of vulnerabilities with this impact can lead to capturing by abuser information, critical for user or system.
Privilege escalation. Exploitation of vulnerabilities with this impact can lead to performing by abuser actions, which are normally disallowed for current role.
support.microsoft.com/kb/4480116
support.microsoft.com/kb/4480961
support.microsoft.com/kb/4480962
support.microsoft.com/kb/4480963
support.microsoft.com/kb/4480964
support.microsoft.com/kb/4480966
support.microsoft.com/kb/4480972
support.microsoft.com/kb/4480973
support.microsoft.com/kb/4480975
support.microsoft.com/kb/4480978
support.microsoft.com/kb/4486993
support.microsoft.com/kb/4486996
support.microsoft.com/kb/4487000
support.microsoft.com/kb/4487017
support.microsoft.com/kb/4487018
support.microsoft.com/kb/4487020
support.microsoft.com/kb/4487025
support.microsoft.com/kb/4487026
support.microsoft.com/kb/4487028
support.microsoft.com/kb/4487044
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0536
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0538
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0543
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0547
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0549
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0550
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0551
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0552
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0553
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0554
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0555
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0569
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0570
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0571
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0572
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0573
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0574
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0575
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0576
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0577
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0578
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0579
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0580
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0581
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0582
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0583
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0584
statistics.securelist.com/
threats.kaspersky.com/en/class/Exploit/
threats.kaspersky.com/en/product/Microsoft-Windows/
9.3 High
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:C/I:C/A:C
7.8 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
8.9 High
AI Score
Confidence
High
0.933 High
EPSS
Percentile
99.1%