9.3 High
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:C/I:C/A:C
8.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
8.4 High
AI Score
Confidence
Low
0.592 Medium
EPSS
Percentile
97.8%
Multiple vulnerabilities were found in Microsoft Products (Extended Support Update). Malicious users can exploit these vulnerabilities to obtain sensitive information, spoof user interface, execute arbitrary code, gain privileges.
Below is a complete list of vulnerabilities:
Public exploits exist for this vulnerability.
Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.
CVE-2017-8741 critical
CVE-2017-8733 warning
CVE-2017-8675 high
CVE-2017-8676 warning
CVE-2017-8719 warning
CVE-2017-8720 critical
CVE-2017-0161 critical
CVE-2017-8628 high
CVE-2017-8677 high
CVE-2017-8678 high
CVE-2017-8679 high
CVE-2017-8680 high
CVE-2017-8681 high
CVE-2017-8682 critical
CVE-2017-8683 high
CVE-2017-8684 high
CVE-2017-8685 high
CVE-2017-8687 high
CVE-2017-8688 high
CVE-2017-8695 high
CVE-2017-8696 critical
CVE-2017-8699 high
CVE-2017-8707 high
CVE-2017-8708 warning
CVE-2017-8709 warning
CVE-2017-8710 high
Install necessary updates from the KB section, that are listed in your Windows Update (Windows Update usually can be accessed from the Control Panel)
Arbitrary code execution. Exploitation of vulnerabilities with this impact can lead to executing by abuser any code or commands at vulnerable machine or process.
Obtain sensitive information. Exploitation of vulnerabilities with this impact can lead to capturing by abuser information, critical for user or system.
Privilege escalation. Exploitation of vulnerabilities with this impact can lead to performing by abuser actions, which are normally disallowed for current role.
Spoof user interface. Exploitation of vulnerabilities with this impact can lead to changes in user interface to beguile user into inaccurate behavior.
support.microsoft.com/kb/4025337
support.microsoft.com/kb/4032201
support.microsoft.com/kb/4034786
support.microsoft.com/kb/4036586
support.microsoft.com/kb/4038777
support.microsoft.com/kb/4038779
support.microsoft.com/kb/4038874
support.microsoft.com/kb/4039038
support.microsoft.com/kb/4039266
support.microsoft.com/kb/4039325
support.microsoft.com/kb/4039384
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2017-0161
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2017-8628
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2017-8675
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2017-8676
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2017-8677
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2017-8678
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2017-8679
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2017-8680
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2017-8681
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2017-8682
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2017-8683
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2017-8684
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2017-8685
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2017-8687
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2017-8688
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2017-8695
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2017-8696
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2017-8699
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2017-8707
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2017-8708
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2017-8709
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2017-8710
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2017-8719
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2017-8720
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2017-8733
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2017-8741
statistics.securelist.com/
threats.kaspersky.com/en/class/Exploit/
threats.kaspersky.com/en/product/Microsoft-Edge/
threats.kaspersky.com/en/product/Microsoft-Internet-Explorer/
threats.kaspersky.com/en/product/Microsoft-Lync-2010-Attendee/
threats.kaspersky.com/en/product/Microsoft-Lync/
threats.kaspersky.com/en/product/Microsoft-Office/
threats.kaspersky.com/en/product/Microsoft-Windows-10/
threats.kaspersky.com/en/product/Microsoft-Windows-7/
threats.kaspersky.com/en/product/Microsoft-Windows-8/
threats.kaspersky.com/en/product/Microsoft-Windows-Server-2008/
threats.kaspersky.com/en/product/Microsoft-Windows-Server-2012/
threats.kaspersky.com/en/product/Microsoft-Windows-Server/
threats.kaspersky.com/en/product/Microsoft-Windows/
threats.kaspersky.com/en/product/Microsoft-Word/
threats.kaspersky.com/en/product/Windows-RT/
9.3 High
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:C/I:C/A:C
8.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
8.4 High
AI Score
Confidence
Low
0.592 Medium
EPSS
Percentile
97.8%