9.3 High
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:C/I:C/A:C
8.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
9.9 High
AI Score
Confidence
High
0.954 High
EPSS
Percentile
99.4%
Multiple vulnerabilities were found in Microsoft Windows. Malicious users can exploit these vulnerabilities to obtain sensitive information, execute arbitrary code, gain privileges, cause denial of service, bypass security restrictions.
Below is a complete list of vulnerabilities:
Public exploits exist for this vulnerability.
Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.
CVE-2020-0987 warning
CVE-2020-0982 warning
CVE-2020-0889 critical
CVE-2020-0960 critical
CVE-2020-0962 warning
CVE-2020-1007 warning
CVE-2020-0964 critical
CVE-2020-0965 warning
CVE-2020-0988 critical
CVE-2020-0959 critical
CVE-2020-1015 high
CVE-2020-1014 high
CVE-2020-0946 warning
CVE-2020-1011 high
CVE-2020-1009 high
CVE-2020-0907 critical
CVE-2020-1094 high
CVE-2020-0687 critical
CVE-2020-0995 critical
CVE-2020-0994 critical
CVE-2020-0993 high
CVE-2020-0992 critical
CVE-2020-0821 warning
CVE-2020-0999 critical
CVE-2020-1000 high
CVE-2020-0953 critical
CVE-2020-0952 warning
CVE-2020-1004 high
CVE-2020-1005 warning
CVE-2020-0956 high
CVE-2020-1008 critical
CVE-2020-0958 high
CVE-2020-1020 high
CVE-2020-1027 high
CVE-2020-0938 high
CVE-2020-0955 warning
CVE-2020-0985 high
CVE-2020-0983 high
CVE-2020-0981 warning
CVE-2020-0942 warning
CVE-2020-0947 warning
CVE-2020-0948 critical
CVE-2020-0949 critical
CVE-2020-0945 warning
CVE-2020-0784 high
CVE-2020-0910 critical
CVE-2020-1003 high
CVE-2020-0913 high
CVE-2020-1029 high
CVE-2020-0944 warning
CVE-2020-0996 high
CVE-2020-0950 critical
CVE-2020-0939 warning
CVE-2020-0918 high
CVE-2020-1006 high
CVE-2020-0888 high
CVE-2020-0917 high
CVE-2020-0937 warning
CVE-2020-0936 warning
CVE-2020-0934 warning
CVE-2020-1017 high
CVE-2020-1016 warning
CVE-2020-0794 warning
CVE-2020-0940 high
CVE-2020-1001 high
CVE-2020-0699 warning
Install necessary updates from the KB section, that are listed in your Windows Update (Windows Update usually can be accessed from the Control Panel)
Arbitrary code execution. Exploitation of vulnerabilities with this impact can lead to executing by abuser any code or commands at vulnerable machine or process.
Obtain sensitive information. Exploitation of vulnerabilities with this impact can lead to capturing by abuser information, critical for user or system.
Denial of service. Exploitation of vulnerabilities with this impact can lead to loss of system availability or critical functional fault.
Security bypass. Exploitation of vulnerabilities with this impact can lead to performing actions restricted by current security settings.
Privilege escalation. Exploitation of vulnerabilities with this impact can lead to performing by abuser actions, which are normally disallowed for current role.
support.microsoft.com/kb/4549949
support.microsoft.com/kb/4549951
support.microsoft.com/kb/4550917
support.microsoft.com/kb/4550922
support.microsoft.com/kb/4550927
support.microsoft.com/kb/4550929
support.microsoft.com/kb/4550930
support.microsoft.com/kb/4550961
support.microsoft.com/kb/4550970
support.microsoft.com/kb/4550971
support.microsoft.com/kb/4571692
support.microsoft.com/kb/4571694
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-0687
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-0699
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-0784
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-0794
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-0821
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-0888
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-0889
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-0907
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-0910
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-0913
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-0917
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-0918
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-0934
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-0936
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-0937
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-0938
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-0939
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-0940
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-0942
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-0944
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-0945
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-0946
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-0947
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-0948
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-0949
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-0950
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-0952
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-0953
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-0955
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-0956
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-0958
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-0959
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-0960
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-0962
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-0964
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-0965
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-0981
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-0982
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-0983
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-0985
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-0987
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-0988
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-0992
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-0993
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-0994
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-0995
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-0996
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-0999
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1000
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1001
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1003
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1004
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1005
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1006
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1007
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1008
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1009
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1011
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1014
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1015
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1016
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1017
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1020
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1027
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1029
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1094
statistics.securelist.com/
threats.kaspersky.com/en/class/Exploit/
threats.kaspersky.com/en/product/Microsoft-Windows-10/
threats.kaspersky.com/en/product/Microsoft-Windows-7/
threats.kaspersky.com/en/product/Microsoft-Windows-8/
threats.kaspersky.com/en/product/Microsoft-Windows-Server-2008/
threats.kaspersky.com/en/product/Microsoft-Windows-Server-2012/
threats.kaspersky.com/en/product/Microsoft-Windows-Server/
threats.kaspersky.com/en/product/Microsoft-Windows/
threats.kaspersky.com/en/product/Windows-RT/
9.3 High
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:C/I:C/A:C
8.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
9.9 High
AI Score
Confidence
High
0.954 High
EPSS
Percentile
99.4%