9.3 High
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:C/I:C/A:C
10 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
CHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
10 High
AI Score
Confidence
High
0.467 Medium
EPSS
Percentile
97.5%
Multiple vulnerabilities were found in Microsoft Products (Extended Support Update). Malicious users can exploit these vulnerabilities to execute arbitrary code, gain privileges, obtain sensitive information, spoof user interface.
Below is a complete list of vulnerabilities:
Public exploits exist for this vulnerability.
Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.
CVE-2020-1488 high
CVE-2020-1379 high
CVE-2020-1537 critical
CVE-2020-1383 high
CVE-2020-1475 critical
CVE-2020-1545 critical
CVE-2020-1579 critical
CVE-2020-1470 critical
CVE-2020-1570 critical
CVE-2020-1536 critical
CVE-2020-1577 critical
CVE-2020-1552 critical
CVE-2020-1535 critical
CVE-2020-1473 high
CVE-2020-1551 critical
CVE-2020-1530 critical
CVE-2020-1474 critical
CVE-2020-1518 critical
CVE-2020-1519 critical
CVE-2020-1516 critical
CVE-2020-1478 critical
CVE-2020-1558 critical
CVE-2020-1515 critical
CVE-2020-1538 critical
CVE-2020-1539 critical
CVE-2020-1557 high
CVE-2020-1554 critical
CVE-2020-1472 high
CVE-2020-1517 critical
CVE-2020-1484 critical
CVE-2020-1485 high
CVE-2020-1486 critical
CVE-2020-1544 critical
CVE-2020-1529 critical
CVE-2020-1584 critical
CVE-2020-1587 critical
CVE-2020-1377 critical
CVE-2020-1477 high
CVE-2020-1339 critical
CVE-2020-1567 warning
CVE-2020-1337 critical
CVE-2020-1378 critical
CVE-2020-1564 critical
CVE-2020-1562 critical
CVE-2020-1513 critical
CVE-2020-1541 critical
CVE-2020-1540 critical
CVE-2020-1543 critical
CVE-2020-1542 critical
CVE-2020-1534 critical
CVE-2020-1467 critical
CVE-2020-1464 critical
CVE-2020-1546 critical
CVE-2020-1547 critical
CVE-2020-1520 critical
CVE-2020-1489 critical
CVE-2020-1492 critical
CVE-2020-1487 critical
CVE-2020-1565 critical
CVE-2020-1509 critical
CVE-2020-1466 critical
Install necessary updates from the KB section, that are listed in your Windows Update (Windows Update usually can be accessed from the Control Panel)
Arbitrary code execution. Exploitation of vulnerabilities with this impact can lead to executing by abuser any code or commands at vulnerable machine or process.
Obtain sensitive information. Exploitation of vulnerabilities with this impact can lead to capturing by abuser information, critical for user or system.
Denial of service. Exploitation of vulnerabilities with this impact can lead to loss of system availability or critical functional fault.
Security bypass. Exploitation of vulnerabilities with this impact can lead to performing actions restricted by current security settings.
Privilege escalation. Exploitation of vulnerabilities with this impact can lead to performing by abuser actions, which are normally disallowed for current role.
Spoof user interface. Exploitation of vulnerabilities with this impact can lead to changes in user interface to beguile user into inaccurate behavior.
support.microsoft.com/kb/4571687
support.microsoft.com/kb/4571702
support.microsoft.com/kb/4571703
support.microsoft.com/kb/4571719
support.microsoft.com/kb/4571723
support.microsoft.com/kb/4571729
support.microsoft.com/kb/4571730
support.microsoft.com/kb/4571736
support.microsoft.com/kb/4571746
support.microsoft.com/kb/4578013
support.microsoft.com/kb/4601347
support.microsoft.com/kb/4601348
support.microsoft.com/kb/4601349
support.microsoft.com/kb/4601357
support.microsoft.com/kb/4601363
support.microsoft.com/kb/4601384
msrc.microsoft.com/update-guide/vulnerability/CVE-2020-1337
msrc.microsoft.com/update-guide/vulnerability/CVE-2020-1339
msrc.microsoft.com/update-guide/vulnerability/CVE-2020-1377
msrc.microsoft.com/update-guide/vulnerability/CVE-2020-1378
msrc.microsoft.com/update-guide/vulnerability/CVE-2020-1379
msrc.microsoft.com/update-guide/vulnerability/CVE-2020-1383
msrc.microsoft.com/update-guide/vulnerability/CVE-2020-1464
msrc.microsoft.com/update-guide/vulnerability/CVE-2020-1466
msrc.microsoft.com/update-guide/vulnerability/CVE-2020-1467
msrc.microsoft.com/update-guide/vulnerability/CVE-2020-1470
msrc.microsoft.com/update-guide/vulnerability/CVE-2020-1472
msrc.microsoft.com/update-guide/vulnerability/CVE-2020-1473
msrc.microsoft.com/update-guide/vulnerability/CVE-2020-1474
msrc.microsoft.com/update-guide/vulnerability/CVE-2020-1475
msrc.microsoft.com/update-guide/vulnerability/CVE-2020-1477
msrc.microsoft.com/update-guide/vulnerability/CVE-2020-1478
msrc.microsoft.com/update-guide/vulnerability/CVE-2020-1484
msrc.microsoft.com/update-guide/vulnerability/CVE-2020-1485
msrc.microsoft.com/update-guide/vulnerability/CVE-2020-1486
msrc.microsoft.com/update-guide/vulnerability/CVE-2020-1487
msrc.microsoft.com/update-guide/vulnerability/CVE-2020-1488
msrc.microsoft.com/update-guide/vulnerability/CVE-2020-1489
msrc.microsoft.com/update-guide/vulnerability/CVE-2020-1492
msrc.microsoft.com/update-guide/vulnerability/CVE-2020-1509
msrc.microsoft.com/update-guide/vulnerability/CVE-2020-1513
msrc.microsoft.com/update-guide/vulnerability/CVE-2020-1515
msrc.microsoft.com/update-guide/vulnerability/CVE-2020-1516
msrc.microsoft.com/update-guide/vulnerability/CVE-2020-1517
msrc.microsoft.com/update-guide/vulnerability/CVE-2020-1518
msrc.microsoft.com/update-guide/vulnerability/CVE-2020-1519
msrc.microsoft.com/update-guide/vulnerability/CVE-2020-1520
msrc.microsoft.com/update-guide/vulnerability/CVE-2020-1529
msrc.microsoft.com/update-guide/vulnerability/CVE-2020-1530
msrc.microsoft.com/update-guide/vulnerability/CVE-2020-1534
msrc.microsoft.com/update-guide/vulnerability/CVE-2020-1535
msrc.microsoft.com/update-guide/vulnerability/CVE-2020-1536
msrc.microsoft.com/update-guide/vulnerability/CVE-2020-1537
msrc.microsoft.com/update-guide/vulnerability/CVE-2020-1538
msrc.microsoft.com/update-guide/vulnerability/CVE-2020-1539
msrc.microsoft.com/update-guide/vulnerability/CVE-2020-1540
msrc.microsoft.com/update-guide/vulnerability/CVE-2020-1541
msrc.microsoft.com/update-guide/vulnerability/CVE-2020-1542
msrc.microsoft.com/update-guide/vulnerability/CVE-2020-1543
msrc.microsoft.com/update-guide/vulnerability/CVE-2020-1544
msrc.microsoft.com/update-guide/vulnerability/CVE-2020-1545
msrc.microsoft.com/update-guide/vulnerability/CVE-2020-1546
msrc.microsoft.com/update-guide/vulnerability/CVE-2020-1547
msrc.microsoft.com/update-guide/vulnerability/CVE-2020-1551
msrc.microsoft.com/update-guide/vulnerability/CVE-2020-1552
msrc.microsoft.com/update-guide/vulnerability/CVE-2020-1554
msrc.microsoft.com/update-guide/vulnerability/CVE-2020-1557
msrc.microsoft.com/update-guide/vulnerability/CVE-2020-1558
msrc.microsoft.com/update-guide/vulnerability/CVE-2020-1562
msrc.microsoft.com/update-guide/vulnerability/CVE-2020-1564
msrc.microsoft.com/update-guide/vulnerability/CVE-2020-1565
msrc.microsoft.com/update-guide/vulnerability/CVE-2020-1567
msrc.microsoft.com/update-guide/vulnerability/CVE-2020-1570
msrc.microsoft.com/update-guide/vulnerability/CVE-2020-1577
msrc.microsoft.com/update-guide/vulnerability/CVE-2020-1579
msrc.microsoft.com/update-guide/vulnerability/CVE-2020-1584
msrc.microsoft.com/update-guide/vulnerability/CVE-2020-1587
statistics.securelist.com/
threats.kaspersky.com/en/class/Exploit/
threats.kaspersky.com/en/product/Microsoft-Internet-Explorer/
threats.kaspersky.com/en/product/Microsoft-Windows-7/
threats.kaspersky.com/en/product/Microsoft-Windows-Server-2008/
threats.kaspersky.com/en/product/Microsoft-Windows-Server-2012/
threats.kaspersky.com/en/product/Microsoft-Windows-Server/
threats.kaspersky.com/en/product/Microsoft-Windows/
9.3 High
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:C/I:C/A:C
10 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
CHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
10 High
AI Score
Confidence
High
0.467 Medium
EPSS
Percentile
97.5%