7.5 High
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10 High
AI Score
Confidence
High
0.051 Low
EPSS
Percentile
93.0%
Multiple vulnerabilities were found in Microsoft Products (Extended Support Update). Malicious users can exploit these vulnerabilities to cause denial of service, gain privileges, obtain sensitive information, execute arbitrary code, bypass security restrictions.
Below is a complete list of vulnerabilities:
Public exploits exist for this vulnerability.
Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.
CVE-2021-24080 high
CVE-2021-24103 critical
CVE-2021-1734 critical
CVE-2021-25195 critical
CVE-2021-24086 critical
CVE-2021-1727 critical
CVE-2021-24102 critical
CVE-2021-24094 critical
CVE-2021-24076 high
CVE-2021-24078 critical
CVE-2021-24083 critical
CVE-2021-24079 high
CVE-2021-1722 critical
CVE-2021-24074 critical
CVE-2021-24088 critical
CVE-2021-24077 critical
CVE-2020-17162 critical
Install necessary updates from the KB section, that are listed in your Windows Update (Windows Update usually can be accessed from the Control Panel)
Arbitrary code execution. Exploitation of vulnerabilities with this impact can lead to executing by abuser any code or commands at vulnerable machine or process.
Obtain sensitive information. Exploitation of vulnerabilities with this impact can lead to capturing by abuser information, critical for user or system.
Denial of service. Exploitation of vulnerabilities with this impact can lead to loss of system availability or critical functional fault.
Security bypass. Exploitation of vulnerabilities with this impact can lead to performing actions restricted by current security settings.
Privilege escalation. Exploitation of vulnerabilities with this impact can lead to performing by abuser actions, which are normally disallowed for current role.
support.microsoft.com/kb/4577038
support.microsoft.com/kb/4577048
support.microsoft.com/kb/4577066
support.microsoft.com/kb/4577071
support.microsoft.com/kb/4601347
support.microsoft.com/kb/4601348
support.microsoft.com/kb/4601349
support.microsoft.com/kb/4601357
support.microsoft.com/kb/4601360
support.microsoft.com/kb/4601363
support.microsoft.com/kb/4601366
support.microsoft.com/kb/4601384
msrc.microsoft.com/update-guide/vulnerability/CVE-2020-17162
msrc.microsoft.com/update-guide/vulnerability/CVE-2021-1722
msrc.microsoft.com/update-guide/vulnerability/CVE-2021-1727
msrc.microsoft.com/update-guide/vulnerability/CVE-2021-1734
msrc.microsoft.com/update-guide/vulnerability/CVE-2021-24074
msrc.microsoft.com/update-guide/vulnerability/CVE-2021-24076
msrc.microsoft.com/update-guide/vulnerability/CVE-2021-24077
msrc.microsoft.com/update-guide/vulnerability/CVE-2021-24078
msrc.microsoft.com/update-guide/vulnerability/CVE-2021-24079
msrc.microsoft.com/update-guide/vulnerability/CVE-2021-24080
msrc.microsoft.com/update-guide/vulnerability/CVE-2021-24083
msrc.microsoft.com/update-guide/vulnerability/CVE-2021-24086
msrc.microsoft.com/update-guide/vulnerability/CVE-2021-24088
msrc.microsoft.com/update-guide/vulnerability/CVE-2021-24094
msrc.microsoft.com/update-guide/vulnerability/CVE-2021-24102
msrc.microsoft.com/update-guide/vulnerability/CVE-2021-24103
msrc.microsoft.com/update-guide/vulnerability/CVE-2021-25195
statistics.securelist.com/
threats.kaspersky.com/en/class/Exploit/
threats.kaspersky.com/en/product/Microsoft-Windows-7/
threats.kaspersky.com/en/product/Microsoft-Windows-Server-2008/
threats.kaspersky.com/en/product/Microsoft-Windows-Server-2012/
threats.kaspersky.com/en/product/Microsoft-Windows-Server/
threats.kaspersky.com/en/product/Microsoft-Windows/
7.5 High
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10 High
AI Score
Confidence
High
0.051 Low
EPSS
Percentile
93.0%