9.3 High
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:C/I:C/A:C
7.8 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
8.7 High
AI Score
Confidence
High
0.759 High
EPSS
Percentile
98.2%
Multiple vulnerabilities were found in Microsoft Products (Extended Support Update). Malicious users can exploit these vulnerabilities to obtain sensitive information, execute arbitrary code, gain privileges, cause denial of service.
Below is a complete list of vulnerabilities:
Public exploits exist for this vulnerability.
CVE-2017-11768 warning
CVE-2017-11788 warning
CVE-2017-11831 warning
CVE-2017-11832 warning
CVE-2017-11835 warning
CVE-2017-11847 critical
CVE-2017-11849 warning
CVE-2017-11851 warning
CVE-2017-11852 warning
CVE-2017-11853 warning
CVE-2017-11880 warning
CVE-2017-11791 warning
CVE-2017-11834 warning
CVE-2017-11843 critical
CVE-2017-11846 critical
CVE-2017-11848 warning
CVE-2017-11855 critical
CVE-2017-11858 critical
CVE-2017-11869 critical
Install necessary updates from the KB section, that are listed in your Windows Update (Windows Update usually can be accessed from the Control Panel)
Arbitrary code execution. Exploitation of vulnerabilities with this impact can lead to executing by abuser any code or commands at vulnerable machine or process.
Obtain sensitive information. Exploitation of vulnerabilities with this impact can lead to capturing by abuser information, critical for user or system.
Denial of service. Exploitation of vulnerabilities with this impact can lead to loss of system availability or critical functional fault.
Security bypass. Exploitation of vulnerabilities with this impact can lead to performing actions restricted by current security settings.
Privilege escalation. Exploitation of vulnerabilities with this impact can lead to performing by abuser actions, which are normally disallowed for current role.
support.microsoft.com/kb/4046184
support.microsoft.com/kb/4047170
support.microsoft.com/kb/4047206
support.microsoft.com/kb/4047211
support.microsoft.com/kb/4048957
support.microsoft.com/kb/4048960
support.microsoft.com/kb/4048968
support.microsoft.com/kb/4048970
support.microsoft.com/kb/4049164
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2017-11768
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2017-11788
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2017-11791
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2017-11831
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2017-11832
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2017-11834
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2017-11835
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2017-11843
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2017-11846
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2017-11847
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2017-11848
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2017-11849
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2017-11851
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2017-11852
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2017-11853
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2017-11855
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2017-11858
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2017-11869
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2017-11880
statistics.securelist.com/
threats.kaspersky.com/en/product/ChakraCore/
threats.kaspersky.com/en/product/Microsoft-Edge/
threats.kaspersky.com/en/product/Microsoft-Internet-Explorer/
threats.kaspersky.com/en/product/Microsoft-Windows-10/
threats.kaspersky.com/en/product/Microsoft-Windows-7/
threats.kaspersky.com/en/product/Microsoft-Windows-8/
threats.kaspersky.com/en/product/Microsoft-Windows-Server-2008/
threats.kaspersky.com/en/product/Microsoft-Windows-Server-2012/
threats.kaspersky.com/en/product/Microsoft-Windows-Server/
threats.kaspersky.com/en/product/Microsoft-Windows/
threats.kaspersky.com/en/product/Windows-RT/
9.3 High
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:C/I:C/A:C
7.8 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
8.7 High
AI Score
Confidence
High
0.759 High
EPSS
Percentile
98.2%