10 High
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:C/I:C/A:C
10 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
CHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
9.6 High
AI Score
Confidence
High
0.944 High
EPSS
Percentile
99.2%
Multiple vulnerabilities were found in Microsoft Windows. Malicious users can exploit these vulnerabilities to gain privileges, obtain sensitive information, execute arbitrary code, cause denial of service.
Below is a complete list of vulnerabilities:
Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.
CVE-2020-1393 warning
CVE-2020-1333 warning
CVE-2020-1384 warning
CVE-2020-1346 warning
CVE-2020-1389 warning
CVE-2020-1032 critical
CVE-2020-1036 critical
CVE-2020-1360 warning
CVE-2020-1267 warning
CVE-2020-1365 warning
CVE-2020-1354 warning
CVE-2020-1419 warning
CVE-2020-1438 warning
CVE-2020-1435 critical
CVE-2020-1412 critical
CVE-2020-1437 warning
CVE-2020-1436 high
CVE-2020-1430 warning
CVE-2020-1428 warning
CVE-2020-1396 warning
CVE-2020-1397 warning
CVE-2020-1390 warning
CVE-2020-1359 warning
CVE-2020-1371 warning
CVE-2020-1350 critical
CVE-2020-1351 warning
CVE-2020-1040 critical
CVE-2020-1041 critical
CVE-2020-1042 critical
CVE-2020-1043 critical
CVE-2020-1373 warning
CVE-2020-1410 critical
CVE-2020-1374 high
CVE-2020-1085 warning
CVE-2020-1407 critical
CVE-2020-1400 critical
CVE-2020-1401 critical
CVE-2020-1402 high
CVE-2020-1427 warning
CVE-2020-1468 warning
CVE-2020-1408 critical
CVE-2020-1409 critical
CVE-2020-1421 critical
CVE-2020-1347 warning
CVE-2020-1344 warning
CVE-2020-1418 high
CVE-2020-1413 warning
CVE-2020-1411 high
CVE-2020-1415 warning
CVE-2020-1414 warning
CVE-2020-1358 warning
CVE-2020-1352 warning
CVE-2020-1353 warning
CVE-2020-1355 warning
CVE-2020-1356 warning
CVE-2020-1357 warning
CVE-2020-1404 warning
CVE-2020-1405 warning
CVE-2020-1406 high
CVE-2020-1336 warning
CVE-2020-1330 warning
CVE-2020-1463 warning
CVE-2020-1382 warning
CVE-2020-1381 warning
CVE-2020-1387 warning
CVE-2020-1386 warning
CVE-2020-1385 warning
CVE-2020-1388 warning
CVE-2020-1398 warning
CVE-2020-1399 warning
CVE-2020-1394 warning
CVE-2020-1395 warning
CVE-2020-1391 warning
CVE-2020-1392 warning
CVE-2020-1361 warning
CVE-2020-1363 warning
CVE-2020-1362 warning
CVE-2020-1364 warning
CVE-2020-1367 warning
CVE-2020-1366 warning
CVE-2020-1369 warning
CVE-2020-1368 warning
CVE-2020-1434 warning
CVE-2020-1431 warning
CVE-2020-1372 warning
CVE-2020-1370 warning
CVE-2020-1375 warning
CVE-2020-1249 warning
CVE-2020-1429 high
CVE-2020-1426 warning
CVE-2020-1424 high
CVE-2020-1422 warning
CVE-2020-1423 warning
CVE-2020-1420 warning
Install necessary updates from the KB section, that are listed in your Windows Update (Windows Update usually can be accessed from the Control Panel)
Arbitrary code execution. Exploitation of vulnerabilities with this impact can lead to executing by abuser any code or commands at vulnerable machine or process.
Obtain sensitive information. Exploitation of vulnerabilities with this impact can lead to capturing by abuser information, critical for user or system.
Denial of service. Exploitation of vulnerabilities with this impact can lead to loss of system availability or critical functional fault.
Privilege escalation. Exploitation of vulnerabilities with this impact can lead to performing by abuser actions, which are normally disallowed for current role.
support.microsoft.com/kb/4558997
support.microsoft.com/kb/4558998
support.microsoft.com/kb/4565483
support.microsoft.com/kb/4565489
support.microsoft.com/kb/4565503
support.microsoft.com/kb/4565508
support.microsoft.com/kb/4565511
support.microsoft.com/kb/4565513
support.microsoft.com/kb/4565535
support.microsoft.com/kb/4565537
support.microsoft.com/kb/4565540
support.microsoft.com/kb/4565541
support.microsoft.com/kb/4565552
support.microsoft.com/kb/4565553
support.microsoft.com/kb/4565554
support.microsoft.com/kb/4565911
support.microsoft.com/kb/4565912
support.microsoft.com/kb/4566425
support.microsoft.com/kb/4566426
support.microsoft.com/kb/4566785
support.microsoft.com/kb/4571692
support.microsoft.com/kb/4571694
nvd.nist.gov/vuln/detail/CVE-2020-1346
nvd.nist.gov/vuln/detail/CVE-2020-1386
nvd.nist.gov/vuln/detail/CVE-2020-1390
nvd.nist.gov/vuln/detail/CVE-2020-1397
nvd.nist.gov/vuln/detail/CVE-2020-1410
nvd.nist.gov/vuln/detail/CVE-2020-1412
nvd.nist.gov/vuln/detail/CVE-2020-1421
nvd.nist.gov/vuln/detail/CVE-2020-1424
nvd.nist.gov/vuln/detail/CVE-2020-1434
nvd.nist.gov/vuln/detail/CVE-2020-1437
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1032
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1036
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1040
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1041
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1042
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1043
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1085
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1249
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1267
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1330
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1333
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1336
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1344
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1347
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1350
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1351
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1352
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1353
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1354
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1355
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1356
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1357
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1358
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1359
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1360
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1361
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1362
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1363
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1364
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1365
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1366
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1367
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1368
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1369
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1370
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1371
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1372
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1373
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1374
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1375
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1381
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1382
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1384
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1385
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1387
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1388
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1389
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1391
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1392
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1393
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1394
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1395
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1396
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1398
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1399
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1400
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1401
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1402
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1404
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1405
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1406
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1407
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1408
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1409
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1411
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1413
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1414
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1415
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1418
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1419
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1420
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1422
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1423
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1426
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1427
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1428
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1429
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1430
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1431
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1435
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1436
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1438
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1463
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1468
portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV200008
statistics.securelist.com/
threats.kaspersky.com/en/class/Exploit/
threats.kaspersky.com/en/product/Microsoft-Windows-10/
threats.kaspersky.com/en/product/Microsoft-Windows-7/
threats.kaspersky.com/en/product/Microsoft-Windows-8/
threats.kaspersky.com/en/product/Microsoft-Windows-Server-2008/
threats.kaspersky.com/en/product/Microsoft-Windows-Server-2012/
threats.kaspersky.com/en/product/Microsoft-Windows-Server/
threats.kaspersky.com/en/product/Microsoft-Windows/
threats.kaspersky.com/en/product/Windows-RT/
10 High
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:C/I:C/A:C
10 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
CHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
9.6 High
AI Score
Confidence
High
0.944 High
EPSS
Percentile
99.2%