10 High
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:C/I:C/A:C
10 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
CHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
10 High
AI Score
Confidence
High
0.944 High
EPSS
Percentile
99.2%
Multiple vulnerabilities were found in Microsoft Products (Extended Support Update). Malicious users can exploit these vulnerabilities to gain privileges, obtain sensitive information, execute arbitrary code, cause denial of service.
Below is a complete list of vulnerabilities:
Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.
CVE-2020-1403 critical
CVE-2020-1333 warning
CVE-2020-1384 warning
CVE-2020-1346 warning
CVE-2020-1389 warning
CVE-2020-1032 critical
CVE-2020-1036 critical
CVE-2020-1360 warning
CVE-2020-1267 warning
CVE-2020-1365 warning
CVE-2020-1354 warning
CVE-2020-1419 warning
CVE-2020-1438 warning
CVE-2020-1435 critical
CVE-2020-1412 critical
CVE-2020-1437 warning
CVE-2020-1436 high
CVE-2020-1430 warning
CVE-2020-1428 warning
CVE-2020-1396 warning
CVE-2020-1397 warning
CVE-2020-1390 warning
CVE-2020-1359 warning
CVE-2020-1371 warning
CVE-2020-1350 critical
CVE-2020-1351 warning
CVE-2020-1040 critical
CVE-2020-1041 critical
CVE-2020-1042 critical
CVE-2020-1043 critical
CVE-2020-1373 warning
CVE-2020-1410 critical
CVE-2020-1374 high
CVE-2020-1085 warning
CVE-2020-1407 critical
CVE-2020-1400 critical
CVE-2020-1401 critical
CVE-2020-1402 high
CVE-2020-1427 warning
CVE-2020-1468 warning
CVE-2020-1408 critical
CVE-2020-1409 critical
CVE-2020-1421 critical
Install necessary updates from the KB section, that are listed in your Windows Update (Windows Update usually can be accessed from the Control Panel)
Arbitrary code execution. Exploitation of vulnerabilities with this impact can lead to executing by abuser any code or commands at vulnerable machine or process.
Obtain sensitive information. Exploitation of vulnerabilities with this impact can lead to capturing by abuser information, critical for user or system.
Denial of service. Exploitation of vulnerabilities with this impact can lead to loss of system availability or critical functional fault.
Privilege escalation. Exploitation of vulnerabilities with this impact can lead to performing by abuser actions, which are normally disallowed for current role.
support.microsoft.com/kb/4565353
support.microsoft.com/kb/4565354
support.microsoft.com/kb/4565479
support.microsoft.com/kb/4565524
support.microsoft.com/kb/4565529
support.microsoft.com/kb/4565536
support.microsoft.com/kb/4565539
nvd.nist.gov/vuln/detail/CVE-2020-1371
nvd.nist.gov/vuln/detail/CVE-2020-1390
nvd.nist.gov/vuln/detail/CVE-2020-1400
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/ADV200008
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1032
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1036
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1040
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1041
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1042
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1043
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1085
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1267
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1333
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1346
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1350
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1351
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1354
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1359
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1360
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1365
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1373
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1374
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1384
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1389
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1396
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1397
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1401
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1402
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1403
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1407
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1408
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1409
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1410
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1412
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1419
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1421
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1427
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1428
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1430
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1435
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1436
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1437
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1438
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1468
statistics.securelist.com/
threats.kaspersky.com/en/class/Exploit/
threats.kaspersky.com/en/product/Microsoft-Internet-Explorer/
threats.kaspersky.com/en/product/Microsoft-Office/
threats.kaspersky.com/en/product/Microsoft-Windows-10/
threats.kaspersky.com/en/product/Microsoft-Windows-7/
threats.kaspersky.com/en/product/Microsoft-Windows-8/
threats.kaspersky.com/en/product/Microsoft-Windows-Server-2003/
threats.kaspersky.com/en/product/Microsoft-Windows-Server-2008/
threats.kaspersky.com/en/product/Microsoft-Windows-Server-2012/
threats.kaspersky.com/en/product/Microsoft-Windows-Server/
threats.kaspersky.com/en/product/Microsoft-Windows/
threats.kaspersky.com/en/product/Windows-RT/
10 High
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:C/I:C/A:C
10 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
CHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
10 High
AI Score
Confidence
High
0.944 High
EPSS
Percentile
99.2%