9.3 High
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:C/I:C/A:C
9.9 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
CHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
10 High
AI Score
Confidence
High
0.194 Low
EPSS
Percentile
96.3%
Multiple vulnerabilities were found in Microsoft Windows. Malicious users can exploit these vulnerabilities to obtain sensitive information, gain privileges, cause denial of service, execute arbitrary code, bypass security restrictions, spoof user interface.
Below is a complete list of vulnerabilities:
Public exploits exist for this vulnerability.
Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.
CVE-2020-1145 warning
CVE-2020-1048 high
CVE-2020-1084 warning
CVE-2020-0963 warning
CVE-2020-1112 critical
CVE-2020-1131 warning
CVE-2020-1118 critical
CVE-2020-1134 warning
CVE-2020-1179 warning
CVE-2020-1136 critical
CVE-2020-0909 warning
CVE-2020-1174 critical
CVE-2020-1113 critical
CVE-2020-1176 critical
CVE-2020-1111 high
CVE-2020-1116 warning
CVE-2020-1117 critical
CVE-2020-1114 high
CVE-2020-1156 high
CVE-2020-1157 high
CVE-2020-1077 warning
CVE-2020-1155 high
CVE-2020-1071 high
CVE-2020-1070 high
CVE-2020-1055 warning
CVE-2020-1072 warning
CVE-2020-1110 high
CVE-2020-1079 high
CVE-2020-1078 warning
CVE-2020-1158 high
CVE-2020-1090 warning
CVE-2020-1139 high
CVE-2020-1054 high
CVE-2020-1190 warning
CVE-2020-1191 warning
CVE-2020-1138 high
CVE-2020-1143 high
CVE-2020-1075 warning
CVE-2020-1067 critical
CVE-2020-1125 high
CVE-2020-1051 critical
CVE-2020-1109 high
CVE-2020-1126 critical
CVE-2020-1028 critical
CVE-2020-1154 high
CVE-2020-1123 warning
CVE-2020-1121 high
CVE-2020-1142 high
CVE-2020-1021 warning
CVE-2020-1153 critical
CVE-2020-1088 warning
CVE-2020-1144 warning
CVE-2020-1141 warning
CVE-2020-1166 high
CVE-2020-1165 high
CVE-2020-1061 critical
CVE-2020-1175 critical
CVE-2020-1081 high
CVE-2020-1082 warning
CVE-2020-1151 high
CVE-2020-1149 high
CVE-2020-1132 high
CVE-2020-1086 warning
CVE-2020-1087 warning
CVE-2020-1010 high
CVE-2020-1068 high
CVE-2020-1140 high
CVE-2020-1124 warning
CVE-2020-1137 high
CVE-2020-1184 warning
CVE-2020-1187 warning
CVE-2020-1186 warning
CVE-2020-1189 warning
CVE-2020-1188 warning
CVE-2020-1185 warning
CVE-2020-1164 high
CVE-2020-1076 warning
CVE-2020-1135 high
Install necessary updates from the KB section, that are listed in your Windows Update (Windows Update usually can be accessed from the Control Panel)
Arbitrary code execution. Exploitation of vulnerabilities with this impact can lead to executing by abuser any code or commands at vulnerable machine or process.
Obtain sensitive information. Exploitation of vulnerabilities with this impact can lead to capturing by abuser information, critical for user or system.
Denial of service. Exploitation of vulnerabilities with this impact can lead to loss of system availability or critical functional fault.
Security bypass. Exploitation of vulnerabilities with this impact can lead to performing actions restricted by current security settings.
Privilege escalation. Exploitation of vulnerabilities with this impact can lead to performing by abuser actions, which are normally disallowed for current role.
Spoof user interface. Exploitation of vulnerabilities with this impact can lead to changes in user interface to beguile user into inaccurate behavior.
support.microsoft.com/kb/4551853
support.microsoft.com/kb/4556799
support.microsoft.com/kb/4556807
support.microsoft.com/kb/4556812
support.microsoft.com/kb/4556813
support.microsoft.com/kb/4556826
support.microsoft.com/kb/4556840
support.microsoft.com/kb/4556846
support.microsoft.com/kb/4556852
support.microsoft.com/kb/4556853
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-0909
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-0963
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1010
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1021
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1028
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1048
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1051
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1054
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1055
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1061
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1067
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1068
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1070
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1071
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1072
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1075
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1076
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1077
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1078
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1079
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1081
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1082
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1084
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1086
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1087
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1088
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1090
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1109
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1110
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1111
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1112
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1113
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1114
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1116
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1117
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1118
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1121
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1123
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1124
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1125
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1126
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1131
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1132
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1134
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1135
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1136
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1137
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1138
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1139
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1140
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1141
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1142
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1143
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1144
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1145
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1149
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1151
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1153
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1154
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1155
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1156
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1157
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1158
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1164
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1165
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1166
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1174
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1175
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1176
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1179
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1184
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1185
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1186
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1187
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1188
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1189
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1190
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1191
statistics.securelist.com/
threats.kaspersky.com/en/class/Exploit/
threats.kaspersky.com/en/product/Microsoft-Windows-10/
threats.kaspersky.com/en/product/Microsoft-Windows-7/
threats.kaspersky.com/en/product/Microsoft-Windows-8/
threats.kaspersky.com/en/product/Microsoft-Windows-Server-2008/
threats.kaspersky.com/en/product/Microsoft-Windows-Server-2012/
threats.kaspersky.com/en/product/Microsoft-Windows-Server/
threats.kaspersky.com/en/product/Microsoft-Windows/
threats.kaspersky.com/en/product/Windows-RT/
9.3 High
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:C/I:C/A:C
9.9 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
CHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
10 High
AI Score
Confidence
High
0.194 Low
EPSS
Percentile
96.3%