7.6 High
CVSS2
Attack Vector
NETWORK
Attack Complexity
HIGH
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:H/Au:N/C:C/I:C/A:C
7.8 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
9 High
AI Score
Confidence
High
0.968 High
EPSS
Percentile
99.7%
Multiple vulnerabilities were found in Microsoft Products (Extended Support Update). Malicious users can exploit these vulnerabilities to gain privileges, obtain sensitive information, execute arbitrary code.
Below is a complete list of vulnerabilities:
Public exploits exist for this vulnerability.
Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.
CVE-2018-8622 warning
CVE-2018-8641 high
CVE-2018-8639 high
CVE-2018-8596 warning
CVE-2018-8611 high
CVE-2018-8621 warning
CVE-2018-8477 warning
CVE-2018-8514 warning
CVE-2018-8595 warning
CVE-2018-8643 critical
CVE-2018-8631 critical
CVE-2018-8625 critical
CVE-2018-8619 critical
Install necessary updates from the KB section, that are listed in your Windows Update (Windows Update usually can be accessed from the Control Panel)
Arbitrary code execution. Exploitation of vulnerabilities with this impact can lead to executing by abuser any code or commands at vulnerable machine or process.
Obtain sensitive information. Exploitation of vulnerabilities with this impact can lead to capturing by abuser information, critical for user or system.
Privilege escalation. Exploitation of vulnerabilities with this impact can lead to performing by abuser actions, which are normally disallowed for current role.
support.microsoft.com/kb/4470199
support.microsoft.com/kb/4471318
support.microsoft.com/kb/4471319
support.microsoft.com/kb/4471325
support.microsoft.com/kb/4471328
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-8477
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-8514
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-8595
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-8596
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-8611
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-8619
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-8621
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-8622
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-8625
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-8631
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-8639
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-8641
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-8643
statistics.securelist.com/
threats.kaspersky.com/en/class/Exploit/
threats.kaspersky.com/en/product/Microsoft-Internet-Explorer/
threats.kaspersky.com/en/product/Microsoft-Windows-10/
threats.kaspersky.com/en/product/Microsoft-Windows-7/
threats.kaspersky.com/en/product/Microsoft-Windows-8/
threats.kaspersky.com/en/product/Microsoft-Windows-Server-2008/
threats.kaspersky.com/en/product/Microsoft-Windows-Server-2012/
threats.kaspersky.com/en/product/Microsoft-Windows-Server/
threats.kaspersky.com/en/product/Microsoft-Windows/
threats.kaspersky.com/en/product/Windows-RT/
7.6 High
CVSS2
Attack Vector
NETWORK
Attack Complexity
HIGH
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:H/Au:N/C:C/I:C/A:C
7.8 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
9 High
AI Score
Confidence
High
0.968 High
EPSS
Percentile
99.7%