7.2 High
CVSS2
Attack Vector
LOCAL
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:L/AC:L/Au:N/C:C/I:C/A:C
8.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
9.6 High
AI Score
Confidence
High
0.512 Medium
EPSS
Percentile
97.6%
Multiple vulnerabilities were found in Microsoft Windows. Malicious users can exploit these vulnerabilities to gain privileges, bypass security restrictions, obtain sensitive information, spoof user interface, execute arbitrary code, cause denial of service.
Below is a complete list of vulnerabilities:
Public exploits exist for this vulnerability.
Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.
CVE-2021-36970 critical
CVE-2021-40455 high
CVE-2021-38662 high
CVE-2021-41335 critical
CVE-2021-40449 critical
CVE-2021-38663 high
CVE-2021-41342 high
CVE-2021-26442 high
CVE-2021-41332 high
CVE-2021-40466 critical
CVE-2021-41331 critical
CVE-2021-40469 high
CVE-2021-41340 critical
CVE-2021-40467 critical
CVE-2021-36953 critical
CVE-2021-40489 critical
CVE-2021-40443 critical
CVE-2021-40460 high
CVE-2021-40465 critical
CVE-2021-41343 high
CVE-2021-40464 critical
CVE-2021-40477 critical
CVE-2021-41337 warning
CVE-2021-40470 critical
CVE-2021-41336 high
CVE-2021-41345 critical
CVE-2021-40468 high
CVE-2021-40488 critical
CVE-2021-40476 critical
CVE-2021-40461 critical
CVE-2021-41339 warning
CVE-2021-41330 critical
CVE-2021-40463 critical
CVE-2021-40475 high
CVE-2021-41346 high
CVE-2021-40478 critical
CVE-2021-40456 high
CVE-2021-40462 critical
CVE-2021-41357 critical
CVE-2021-38672 critical
CVE-2021-41338 high
CVE-2021-40450 critical
CVE-2021-41347 critical
CVE-2021-26441 critical
CVE-2021-40454 high
CVE-2021-41361 high
CVE-2021-41334 high
Install necessary updates from the KB section, that are listed in your Windows Update (Windows Update usually can be accessed from the Control Panel)
Arbitrary code execution. Exploitation of vulnerabilities with this impact can lead to executing by abuser any code or commands at vulnerable machine or process.
Obtain sensitive information. Exploitation of vulnerabilities with this impact can lead to capturing by abuser information, critical for user or system.
Denial of service. Exploitation of vulnerabilities with this impact can lead to loss of system availability or critical functional fault.
Security bypass. Exploitation of vulnerabilities with this impact can lead to performing actions restricted by current security settings.
Privilege escalation. Exploitation of vulnerabilities with this impact can lead to performing by abuser actions, which are normally disallowed for current role.
Spoof user interface. Exploitation of vulnerabilities with this impact can lead to changes in user interface to beguile user into inaccurate behavior.
support.microsoft.com/kb/5006667
support.microsoft.com/kb/5006669
support.microsoft.com/kb/5006670
support.microsoft.com/kb/5006671
support.microsoft.com/kb/5006672
support.microsoft.com/kb/5006674
support.microsoft.com/kb/5006675
support.microsoft.com/kb/5006699
support.microsoft.com/kb/5006714
support.microsoft.com/kb/5006729
nvd.nist.gov/vuln/detail/CVE-2021-26441
nvd.nist.gov/vuln/detail/CVE-2021-26442
nvd.nist.gov/vuln/detail/CVE-2021-36953
nvd.nist.gov/vuln/detail/CVE-2021-36970
nvd.nist.gov/vuln/detail/CVE-2021-38662
nvd.nist.gov/vuln/detail/CVE-2021-38663
nvd.nist.gov/vuln/detail/CVE-2021-38672
nvd.nist.gov/vuln/detail/CVE-2021-40443
nvd.nist.gov/vuln/detail/CVE-2021-40449
nvd.nist.gov/vuln/detail/CVE-2021-40450
nvd.nist.gov/vuln/detail/CVE-2021-40454
nvd.nist.gov/vuln/detail/CVE-2021-40455
nvd.nist.gov/vuln/detail/CVE-2021-40456
nvd.nist.gov/vuln/detail/CVE-2021-40460
nvd.nist.gov/vuln/detail/CVE-2021-40461
nvd.nist.gov/vuln/detail/CVE-2021-40462
nvd.nist.gov/vuln/detail/CVE-2021-40463
nvd.nist.gov/vuln/detail/CVE-2021-40464
nvd.nist.gov/vuln/detail/CVE-2021-40465
nvd.nist.gov/vuln/detail/CVE-2021-40466
nvd.nist.gov/vuln/detail/CVE-2021-40467
nvd.nist.gov/vuln/detail/CVE-2021-40468
nvd.nist.gov/vuln/detail/CVE-2021-40469
nvd.nist.gov/vuln/detail/CVE-2021-40470
nvd.nist.gov/vuln/detail/CVE-2021-40475
nvd.nist.gov/vuln/detail/CVE-2021-40476
nvd.nist.gov/vuln/detail/CVE-2021-40477
nvd.nist.gov/vuln/detail/CVE-2021-40478
nvd.nist.gov/vuln/detail/CVE-2021-40488
nvd.nist.gov/vuln/detail/CVE-2021-40489
nvd.nist.gov/vuln/detail/CVE-2021-41330
nvd.nist.gov/vuln/detail/CVE-2021-41331
nvd.nist.gov/vuln/detail/CVE-2021-41332
nvd.nist.gov/vuln/detail/CVE-2021-41334
nvd.nist.gov/vuln/detail/CVE-2021-41335
nvd.nist.gov/vuln/detail/CVE-2021-41336
nvd.nist.gov/vuln/detail/CVE-2021-41337
nvd.nist.gov/vuln/detail/CVE-2021-41338
nvd.nist.gov/vuln/detail/CVE-2021-41339
nvd.nist.gov/vuln/detail/CVE-2021-41340
nvd.nist.gov/vuln/detail/CVE-2021-41342
nvd.nist.gov/vuln/detail/CVE-2021-41343
nvd.nist.gov/vuln/detail/CVE-2021-41345
nvd.nist.gov/vuln/detail/CVE-2021-41346
nvd.nist.gov/vuln/detail/CVE-2021-41347
nvd.nist.gov/vuln/detail/CVE-2021-41357
nvd.nist.gov/vuln/detail/CVE-2021-41361
statistics.securelist.com/
threats.kaspersky.com/en/class/Exploit/
threats.kaspersky.com/en/product/Microsoft-Office/
threats.kaspersky.com/en/product/Microsoft-Windows-10/
threats.kaspersky.com/en/product/Microsoft-Windows-7/
threats.kaspersky.com/en/product/Microsoft-Windows-8/
threats.kaspersky.com/en/product/Microsoft-Windows-Server-2008/
threats.kaspersky.com/en/product/Microsoft-Windows-Server-2012/
threats.kaspersky.com/en/product/Microsoft-Windows-Server-2016/
threats.kaspersky.com/en/product/Microsoft-Windows-Server-2019/
threats.kaspersky.com/en/product/Microsoft-Windows-Server/
threats.kaspersky.com/en/product/Microsoft-Windows/
threats.kaspersky.com/en/product/Windows-RT/
7.2 High
CVSS2
Attack Vector
LOCAL
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:L/AC:L/Au:N/C:C/I:C/A:C
8.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
9.6 High
AI Score
Confidence
High
0.512 Medium
EPSS
Percentile
97.6%