7.5 High
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
8.8 High
CVSS3
Attack Vector
ADJACENT
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.6 High
AI Score
Confidence
High
0.512 Medium
EPSS
Percentile
97.6%
Multiple vulnerabilities were found in Microsoft Windows. Malicious users can exploit these vulnerabilities to gain privileges, obtain sensitive information, cause denial of service, bypass security restrictions, execute arbitrary code, spoof user interface.
Below is a complete list of vulnerabilities:
Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.
CVE-2021-38635 unknown
CVE-2021-36962 unknown
CVE-2021-38628 unknown
CVE-2021-36961 unknown
CVE-2021-38671 unknown
CVE-2021-26435 unknown
CVE-2021-38630 unknown
CVE-2021-36969 unknown
CVE-2021-36955 unknown
CVE-2021-38638 unknown
CVE-2021-36964 unknown
CVE-2021-38629 unknown
CVE-2021-40447 unknown
CVE-2021-38639 unknown
CVE-2021-36959 unknown
CVE-2021-38667 unknown
CVE-2021-38636 unknown
CVE-2021-36960 unknown
CVE-2021-36965 unknown
CVE-2021-36963 unknown
CVE-2021-38633 unknown
CVE-2021-36973 unknown
CVE-2021-38632 unknown
CVE-2021-38644 unknown
CVE-2021-36967 unknown
CVE-2021-38634 unknown
CVE-2021-36972 unknown
CVE-2021-36974 unknown
CVE-2021-36966 unknown
CVE-2021-38624 unknown
CVE-2021-38661 unknown
CVE-2021-36954 unknown
CVE-2021-36975 unknown
CVE-2021-38637 unknown
Install necessary updates from the KB section, that are listed in your Windows Update (Windows Update usually can be accessed from the Control Panel)
Arbitrary code execution. Exploitation of vulnerabilities with this impact can lead to executing by abuser any code or commands at vulnerable machine or process.
Obtain sensitive information. Exploitation of vulnerabilities with this impact can lead to capturing by abuser information, critical for user or system.
Denial of service. Exploitation of vulnerabilities with this impact can lead to loss of system availability or critical functional fault.
Security bypass. Exploitation of vulnerabilities with this impact can lead to performing actions restricted by current security settings.
Privilege escalation. Exploitation of vulnerabilities with this impact can lead to performing by abuser actions, which are normally disallowed for current role.
Spoof user interface. Exploitation of vulnerabilities with this impact can lead to changes in user interface to beguile user into inaccurate behavior.
support.microsoft.com/kb/5005565
support.microsoft.com/kb/5005566
support.microsoft.com/kb/5005568
support.microsoft.com/kb/5005569
support.microsoft.com/kb/5005573
support.microsoft.com/kb/5005575
support.microsoft.com/kb/5005607
support.microsoft.com/kb/5005613
support.microsoft.com/kb/5005623
support.microsoft.com/kb/5005627
support.microsoft.com/kb/5006667
support.microsoft.com/kb/5006670
support.microsoft.com/kb/5006672
support.microsoft.com/kb/5006674
support.microsoft.com/kb/5006699
nvd.nist.gov/vuln/detail/CVE-2021-26435
nvd.nist.gov/vuln/detail/CVE-2021-36954
nvd.nist.gov/vuln/detail/CVE-2021-36955
nvd.nist.gov/vuln/detail/CVE-2021-36959
nvd.nist.gov/vuln/detail/CVE-2021-36960
nvd.nist.gov/vuln/detail/CVE-2021-36961
nvd.nist.gov/vuln/detail/CVE-2021-36962
nvd.nist.gov/vuln/detail/CVE-2021-36963
nvd.nist.gov/vuln/detail/CVE-2021-36964
nvd.nist.gov/vuln/detail/CVE-2021-36965
nvd.nist.gov/vuln/detail/CVE-2021-36966
nvd.nist.gov/vuln/detail/CVE-2021-36967
nvd.nist.gov/vuln/detail/CVE-2021-36969
nvd.nist.gov/vuln/detail/CVE-2021-36972
nvd.nist.gov/vuln/detail/CVE-2021-36973
nvd.nist.gov/vuln/detail/CVE-2021-36974
nvd.nist.gov/vuln/detail/CVE-2021-36975
nvd.nist.gov/vuln/detail/CVE-2021-38624
nvd.nist.gov/vuln/detail/CVE-2021-38628
nvd.nist.gov/vuln/detail/CVE-2021-38629
nvd.nist.gov/vuln/detail/CVE-2021-38630
nvd.nist.gov/vuln/detail/CVE-2021-38632
nvd.nist.gov/vuln/detail/CVE-2021-38633
nvd.nist.gov/vuln/detail/CVE-2021-38634
nvd.nist.gov/vuln/detail/CVE-2021-38635
nvd.nist.gov/vuln/detail/CVE-2021-38636
nvd.nist.gov/vuln/detail/CVE-2021-38637
nvd.nist.gov/vuln/detail/CVE-2021-38638
nvd.nist.gov/vuln/detail/CVE-2021-38639
nvd.nist.gov/vuln/detail/CVE-2021-38644
nvd.nist.gov/vuln/detail/CVE-2021-38661
nvd.nist.gov/vuln/detail/CVE-2021-38667
nvd.nist.gov/vuln/detail/CVE-2021-38671
nvd.nist.gov/vuln/detail/CVE-2021-40447
statistics.securelist.com/
threats.kaspersky.com/en/class/Exploit/
threats.kaspersky.com/en/product/Microsoft-Windows-10/
threats.kaspersky.com/en/product/Microsoft-Windows-7/
threats.kaspersky.com/en/product/Microsoft-Windows-8/
threats.kaspersky.com/en/product/Microsoft-Windows-Server-2008/
threats.kaspersky.com/en/product/Microsoft-Windows-Server-2012/
threats.kaspersky.com/en/product/Microsoft-Windows-Server-2016/
threats.kaspersky.com/en/product/Microsoft-Windows-Server-2019/
threats.kaspersky.com/en/product/Microsoft-Windows-Server/
threats.kaspersky.com/en/product/Microsoft-Windows/
threats.kaspersky.com/en/product/Windows-RT/
7.5 High
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
8.8 High
CVSS3
Attack Vector
ADJACENT
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.6 High
AI Score
Confidence
High
0.512 Medium
EPSS
Percentile
97.6%