CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
SINGLE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:L/Au:S/C:C/I:C/A:C
CVSS3
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
LOW
User Interaction
NONE
Scope
CHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H
AI Score
Confidence
Low
EPSS
Percentile
87.3%
Multiple vulnerabilities were found in Microsoft Windows. Malicious users can exploit these vulnerabilities to gain privileges, obtain sensitive information, bypass security restrictions, execute arbitrary code.
Below is a complete list of vulnerabilities:
Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.
CVE-2020-17103 high
CVE-2020-16964 critical
CVE-2020-16960 critical
CVE-2020-17140 critical
CVE-2020-16962 critical
CVE-2020-16963 critical
CVE-2020-16961 critical
CVE-2020-17099 high
CVE-2020-17098 high
CVE-2020-17097 warning
CVE-2020-17096 critical
CVE-2020-17095 critical
CVE-2020-17094 high
CVE-2020-17092 critical
CVE-2020-17138 high
CVE-2020-17139 critical
CVE-2020-17134 critical
CVE-2020-17136 critical
CVE-2020-17137 critical
CVE-2020-16996 high
CVE-2020-16959 critical
CVE-2020-16958 critical
Install necessary updates from the KB section, that are listed in your Windows Update (Windows Update usually can be accessed from the Control Panel)
Arbitrary code execution. Exploitation of vulnerabilities with this impact can lead to executing by abuser any code or commands at vulnerable machine or process.
Obtain sensitive information. Exploitation of vulnerabilities with this impact can lead to capturing by abuser information, critical for user or system.
Security bypass. Exploitation of vulnerabilities with this impact can lead to performing actions restricted by current security settings.
Privilege escalation. Exploitation of vulnerabilities with this impact can lead to performing by abuser actions, which are normally disallowed for current role.
support.microsoft.com/kb/4592438
support.microsoft.com/kb/4592440
support.microsoft.com/kb/4592446
support.microsoft.com/kb/4592449
support.microsoft.com/kb/4592464
support.microsoft.com/kb/4592468
support.microsoft.com/kb/4592484
support.microsoft.com/kb/4592495
support.microsoft.com/kb/4592497
support.microsoft.com/kb/4593226
support.microsoft.com/kb/5000802
support.microsoft.com/kb/5000803
support.microsoft.com/kb/5000808
support.microsoft.com/kb/5000822
support.microsoft.com/kb/5000840
support.microsoft.com/kb/5000847
support.microsoft.com/kb/5000848
support.microsoft.com/kb/5000853
nvd.nist.gov/vuln/detail/CVE-2020-16958
nvd.nist.gov/vuln/detail/CVE-2020-16959
nvd.nist.gov/vuln/detail/CVE-2020-16960
nvd.nist.gov/vuln/detail/CVE-2020-16961
nvd.nist.gov/vuln/detail/CVE-2020-16962
nvd.nist.gov/vuln/detail/CVE-2020-16963
nvd.nist.gov/vuln/detail/CVE-2020-16964
nvd.nist.gov/vuln/detail/CVE-2020-16996
nvd.nist.gov/vuln/detail/CVE-2020-17092
nvd.nist.gov/vuln/detail/CVE-2020-17094
nvd.nist.gov/vuln/detail/CVE-2020-17095
nvd.nist.gov/vuln/detail/CVE-2020-17096
nvd.nist.gov/vuln/detail/CVE-2020-17097
nvd.nist.gov/vuln/detail/CVE-2020-17098
nvd.nist.gov/vuln/detail/CVE-2020-17099
nvd.nist.gov/vuln/detail/CVE-2020-17103
nvd.nist.gov/vuln/detail/CVE-2020-17134
nvd.nist.gov/vuln/detail/CVE-2020-17136
nvd.nist.gov/vuln/detail/CVE-2020-17137
nvd.nist.gov/vuln/detail/CVE-2020-17138
nvd.nist.gov/vuln/detail/CVE-2020-17139
nvd.nist.gov/vuln/detail/CVE-2020-17140
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/ADV200013
statistics.securelist.com/
threats.kaspersky.com/en/class/Exploit/
threats.kaspersky.com/en/product/Microsoft-Windows-10/
threats.kaspersky.com/en/product/Microsoft-Windows-7/
threats.kaspersky.com/en/product/Microsoft-Windows-8/
threats.kaspersky.com/en/product/Microsoft-Windows-Server-2008/
threats.kaspersky.com/en/product/Microsoft-Windows-Server-2012/
threats.kaspersky.com/en/product/Microsoft-Windows-Server/
threats.kaspersky.com/en/product/Microsoft-Windows/
threats.kaspersky.com/en/product/Windows-RT/
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
SINGLE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:L/Au:S/C:C/I:C/A:C
CVSS3
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
LOW
User Interaction
NONE
Scope
CHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H
AI Score
Confidence
Low
EPSS
Percentile
87.3%