9.3 High
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:C/I:C/A:C
10 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
CHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
10 High
AI Score
Confidence
High
0.467 Medium
EPSS
Percentile
97.5%
Multiple vulnerabilities were found in Microsoft Windows. Malicious users can exploit these vulnerabilities to execute arbitrary code, gain privileges, , obtain sensitive information, spoof user interface, cause denial of service.
Below is a complete list of vulnerabilities:
Public exploits exist for this vulnerability.
Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.
CVE-2020-1488 high
CVE-2020-1379 high
CVE-2020-1537 critical
CVE-2020-1383 high
CVE-2020-1475 critical
CVE-2020-1545 critical
CVE-2020-1579 critical
CVE-2020-1470 critical
CVE-2020-1536 critical
CVE-2020-1577 critical
CVE-2020-1552 critical
CVE-2020-1535 critical
CVE-2020-1473 high
CVE-2020-1551 critical
CVE-2020-1530 critical
CVE-2020-1474 critical
CVE-2020-1518 critical
CVE-2020-1519 critical
CVE-2020-1516 critical
CVE-2020-1478 critical
CVE-2020-1558 critical
CVE-2020-1515 critical
CVE-2020-1538 critical
CVE-2020-1539 critical
CVE-2020-1557 high
CVE-2020-1554 critical
CVE-2020-1472 high
CVE-2020-1517 critical
CVE-2020-1484 critical
CVE-2020-1485 high
CVE-2020-1486 critical
CVE-2020-1544 critical
CVE-2020-1529 critical
CVE-2020-1584 critical
CVE-2020-1587 critical
CVE-2020-1377 critical
CVE-2020-1477 high
CVE-2020-1339 critical
CVE-2020-1337 critical
CVE-2020-1378 critical
CVE-2020-1564 critical
CVE-2020-1562 critical
CVE-2020-1513 critical
CVE-2020-1541 critical
CVE-2020-1540 critical
CVE-2020-1543 critical
CVE-2020-1542 critical
CVE-2020-1534 critical
CVE-2020-1467 critical
CVE-2020-1464 critical
CVE-2020-1546 critical
CVE-2020-1547 critical
CVE-2020-1520 critical
CVE-2020-1489 critical
CVE-2020-1492 critical
CVE-2020-1490 critical
CVE-2020-1553 critical
CVE-2020-1550 critical
CVE-2020-1556 critical
CVE-2020-1417 high
CVE-2020-1487 critical
CVE-2020-1480 critical
CVE-2020-1566 warning
CVE-2020-1565 critical
CVE-2020-1561 critical
CVE-2020-1560 critical
CVE-2020-1578 warning
CVE-2020-1571 high
CVE-2020-1574 high
CVE-2020-1479 critical
CVE-2020-1585 critical
CVE-2020-1509 critical
CVE-2020-1459 critical
CVE-2020-1512 critical
CVE-2020-1510 high
CVE-2020-1511 critical
CVE-2020-1528 critical
CVE-2020-1522 critical
CVE-2020-1521 critical
CVE-2020-1527 critical
CVE-2020-1526 critical
CVE-2020-1525 critical
CVE-2020-1524 critical
CVE-2020-1531 critical
CVE-2020-1533 critical
CVE-2020-1466 critical
CVE-2020-1549 critical
CVE-2020-1548 critical
Install necessary updates from the KB section, that are listed in your Windows Update (Windows Update usually can be accessed from the Control Panel)
Arbitrary code execution. Exploitation of vulnerabilities with this impact can lead to executing by abuser any code or commands at vulnerable machine or process.
Obtain sensitive information. Exploitation of vulnerabilities with this impact can lead to capturing by abuser information, critical for user or system.
Denial of service. Exploitation of vulnerabilities with this impact can lead to loss of system availability or critical functional fault.
Security bypass. Exploitation of vulnerabilities with this impact can lead to performing actions restricted by current security settings.
Privilege escalation. Exploitation of vulnerabilities with this impact can lead to performing by abuser actions, which are normally disallowed for current role.
Spoof user interface. Exploitation of vulnerabilities with this impact can lead to changes in user interface to beguile user into inaccurate behavior.
support.microsoft.com/kb/4565349
support.microsoft.com/kb/4565351
support.microsoft.com/kb/4566782
support.microsoft.com/kb/4571692
support.microsoft.com/kb/4571694
support.microsoft.com/kb/4571703
support.microsoft.com/kb/4571709
support.microsoft.com/kb/4571723
support.microsoft.com/kb/4571741
support.microsoft.com/kb/4578013
support.microsoft.com/kb/4601315
support.microsoft.com/kb/4601318
support.microsoft.com/kb/4601319
support.microsoft.com/kb/4601345
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1337
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1339
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1377
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1378
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1379
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1383
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1417
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1459
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1464
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1466
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1467
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1470
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1472
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1473
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1474
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1475
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1477
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1478
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1479
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1480
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1484
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1485
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1486
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1487
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1488
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1489
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1490
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1492
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1509
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1510
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1511
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1512
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1513
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1515
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1516
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1517
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1518
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1519
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1520
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1521
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1522
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1524
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1525
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1526
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1527
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1528
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1529
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1530
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1531
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1533
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1534
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1535
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1536
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1537
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1538
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1539
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1540
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1541
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1542
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1543
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1544
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1545
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1546
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1547
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1548
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1549
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1550
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1551
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1552
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1553
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1554
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1556
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1557
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1558
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1560
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1561
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1562
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1564
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1565
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1566
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1571
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1574
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1577
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1578
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1579
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1584
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1585
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1587
statistics.securelist.com/
threats.kaspersky.com/en/class/Exploit/
threats.kaspersky.com/en/product/Microsoft-Windows-10/
threats.kaspersky.com/en/product/Microsoft-Windows-7/
threats.kaspersky.com/en/product/Microsoft-Windows-8/
threats.kaspersky.com/en/product/Microsoft-Windows-Server-2008/
threats.kaspersky.com/en/product/Microsoft-Windows-Server-2012/
threats.kaspersky.com/en/product/Microsoft-Windows-Server/
threats.kaspersky.com/en/product/Microsoft-Windows/
threats.kaspersky.com/en/product/Windows-RT/
9.3 High
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:C/I:C/A:C
10 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
CHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
10 High
AI Score
Confidence
High
0.467 Medium
EPSS
Percentile
97.5%