9.3 High
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:C/I:C/A:C
8.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
8.7 High
AI Score
Confidence
Low
0.836 High
EPSS
Percentile
98.5%
Multiple vulnerabilities were found in Microsoft Products (Extended Support Update). Malicious users can exploit these vulnerabilities to execute arbitrary code, gain privileges, spoof user interface, obtain sensitive information, bypass security restrictions.
Below is a complete list of vulnerabilities:
CVE-2016-3204 critical
CVE-2016-3248 critical
CVE-2016-3259 critical
CVE-2016-3264 critical
CVE-2016-3273 high
CVE-2016-3274 warning
CVE-2016-3240 critical
CVE-2016-3241 critical
CVE-2016-3242 critical
CVE-2016-3245 high
CVE-2016-3238 critical
CVE-2016-3239 critical
CVE-2016-3249 high
CVE-2016-3254 critical
CVE-2016-3286 high
CVE-2016-3252 high
CVE-2016-3251 warning
Install necessary updates from the KB section, that are listed in your Windows Update (Windows Update usually can be accessed from the Control Panel)
Arbitrary code execution. Exploitation of vulnerabilities with this impact can lead to executing by abuser any code or commands at vulnerable machine or process.
Obtain sensitive information. Exploitation of vulnerabilities with this impact can lead to capturing by abuser information, critical for user or system.
Security bypass. Exploitation of vulnerabilities with this impact can lead to performing actions restricted by current security settings.
Privilege escalation. Exploitation of vulnerabilities with this impact can lead to performing by abuser actions, which are normally disallowed for current role.
Spoof user interface. Exploitation of vulnerabilities with this impact can lead to changes in user interface to beguile user into inaccurate behavior.
support.microsoft.com/kb/3168965
support.microsoft.com/kb/3170106
support.microsoft.com/kb/3170455
support.microsoft.com/kb/4038777
support.microsoft.com/kb/4038779
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2016-3204
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2016-3238
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2016-3239
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2016-3240
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2016-3241
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2016-3242
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2016-3245
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2016-3248
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2016-3249
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2016-3251
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2016-3252
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2016-3254
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2016-3259
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2016-3264
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2016-3273
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2016-3274
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2016-3286
statistics.securelist.com/
threats.kaspersky.com/en/product/Microsoft-Edge/
threats.kaspersky.com/en/product/Microsoft-Internet-Explorer/
threats.kaspersky.com/en/product/Microsoft-Windows-10/
threats.kaspersky.com/en/product/Microsoft-Windows-7/
threats.kaspersky.com/en/product/Microsoft-Windows-8/
threats.kaspersky.com/en/product/Microsoft-Windows-Server-2008/
threats.kaspersky.com/en/product/Microsoft-Windows-Server-2012/
threats.kaspersky.com/en/product/Microsoft-Windows-Server/
threats.kaspersky.com/en/product/Microsoft-Windows-Vista-4/
threats.kaspersky.com/en/product/Microsoft-Windows/
threats.kaspersky.com/en/product/Windows-RT/
9.3 High
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:C/I:C/A:C
8.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
8.7 High
AI Score
Confidence
Low
0.836 High
EPSS
Percentile
98.5%