9.3 High
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:C/I:C/A:C
8.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
9.1 High
AI Score
Confidence
High
0.279 Low
EPSS
Percentile
96.9%
Multiple vulnerabilities were found in Microsoft Products (Extended Support Update). Malicious users can exploit these vulnerabilities to execute arbitrary code, gain privileges, obtain sensitive information, bypass security restrictions.
Below is a complete list of vulnerabilities:
Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.
CVE-2019-1246 critical
CVE-2019-1215 high
CVE-2019-1250 critical
CVE-2019-1293 warning
CVE-2019-1249 critical
CVE-2019-1242 critical
CVE-2019-1286 warning
CVE-2019-1240 critical
CVE-2019-1252 warning
CVE-2019-1291 critical
CVE-2019-1216 warning
CVE-2019-1256 high
CVE-2019-1248 critical
CVE-2019-1271 high
CVE-2019-0787 critical
CVE-2019-1241 critical
CVE-2019-1247 critical
CVE-2019-1290 critical
CVE-2019-1244 warning
CVE-2019-1267 high
CVE-2019-1280 critical
CVE-2019-1268 high
CVE-2019-1285 high
CVE-2019-1284 high
CVE-2019-1219 warning
CVE-2019-1214 high
CVE-2019-1243 critical
CVE-2019-1282 warning
CVE-2019-1283 warning
CVE-2019-1274 warning
CVE-2019-1235 high
CVE-2019-1245 warning
CVE-2019-1220 warning
CVE-2019-1236 critical
CVE-2019-1208 critical
Install necessary updates from the KB section, that are listed in your Windows Update (Windows Update usually can be accessed from the Control Panel)
Arbitrary code execution. Exploitation of vulnerabilities with this impact can lead to executing by abuser any code or commands at vulnerable machine or process.
Obtain sensitive information. Exploitation of vulnerabilities with this impact can lead to capturing by abuser information, critical for user or system.
Security bypass. Exploitation of vulnerabilities with this impact can lead to performing actions restricted by current security settings.
Privilege escalation. Exploitation of vulnerabilities with this impact can lead to performing by abuser actions, which are normally disallowed for current role.
support.microsoft.com/kb/4516026
support.microsoft.com/kb/4516033
support.microsoft.com/kb/4516046
support.microsoft.com/kb/4516051
support.microsoft.com/kb/4516065
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-0787
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-1208
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-1214
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-1215
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-1216
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-1219
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-1220
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-1235
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-1236
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-1240
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-1241
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-1242
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-1243
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-1244
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-1245
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-1246
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-1247
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-1248
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-1249
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-1250
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-1252
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-1256
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-1267
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-1268
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-1271
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-1274
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-1280
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-1282
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-1283
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-1284
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-1285
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-1286
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-1290
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-1291
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-1293
statistics.securelist.com/
threats.kaspersky.com/en/class/Exploit/
threats.kaspersky.com/en/product/Microsoft-Edge/
threats.kaspersky.com/en/product/Microsoft-Internet-Explorer/
threats.kaspersky.com/en/product/Microsoft-Office/
threats.kaspersky.com/en/product/Microsoft-Windows-10/
threats.kaspersky.com/en/product/Microsoft-Windows-7/
threats.kaspersky.com/en/product/Microsoft-Windows-8/
threats.kaspersky.com/en/product/Microsoft-Windows-Server-2008/
threats.kaspersky.com/en/product/Microsoft-Windows-Server-2012/
threats.kaspersky.com/en/product/Microsoft-Windows-Server/
threats.kaspersky.com/en/product/Microsoft-Windows/
threats.kaspersky.com/en/product/Windows-RT/
9.3 High
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:C/I:C/A:C
8.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
9.1 High
AI Score
Confidence
High
0.279 Low
EPSS
Percentile
96.9%