7.7 High
CVSS2
Attack Vector
ADJACENT_NETWORK
Attack Complexity
LOW
Authentication
SINGLE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:A/AC:L/Au:S/C:C/I:C/A:C
9 High
CVSS3
Attack Vector
ADJACENT
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
CHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
9.7 High
AI Score
Confidence
High
0.904 High
EPSS
Percentile
98.8%
Multiple vulnerabilities were found in Microsoft Windows. Malicious users can exploit these vulnerabilities to gain privileges, obtain sensitive information, execute arbitrary code, bypass security restrictions, cause denial of service.
Below is a complete list of vulnerabilities:
Public exploits exist for this vulnerability.
Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.
CVE-2021-42282 high
CVE-2021-41367 warning
CVE-2021-41371 warning
CVE-2021-38665 warning
CVE-2021-38666 high
CVE-2021-42291 high
CVE-2021-42278 high
CVE-2021-41377 warning
CVE-2021-41379 warning
CVE-2021-42285 high
CVE-2021-42283 warning
CVE-2021-42275 high
CVE-2021-38631 warning
CVE-2021-41370 warning
CVE-2021-42287 high
CVE-2021-26443 critical
CVE-2021-42280 warning
CVE-2021-42288 warning
CVE-2021-42276 high
CVE-2021-36957 warning
CVE-2021-42279 high
CVE-2021-42284 high
CVE-2021-42286 warning
CVE-2021-42274 warning
CVE-2021-42277 warning
CVE-2021-41378 high
CVE-2021-41356 warning
CVE-2021-41366 warning
Install necessary updates from the KB section, that are listed in your Windows Update (Windows Update usually can be accessed from the Control Panel)
Arbitrary code execution. Exploitation of vulnerabilities with this impact can lead to executing by abuser any code or commands at vulnerable machine or process.
Obtain sensitive information. Exploitation of vulnerabilities with this impact can lead to capturing by abuser information, critical for user or system.
Denial of service. Exploitation of vulnerabilities with this impact can lead to loss of system availability or critical functional fault.
Security bypass. Exploitation of vulnerabilities with this impact can lead to performing actions restricted by current security settings.
Privilege escalation. Exploitation of vulnerabilities with this impact can lead to performing by abuser actions, which are normally disallowed for current role.
support.microsoft.com/kb/5007186
support.microsoft.com/kb/5007189
support.microsoft.com/kb/5007192
support.microsoft.com/kb/5007205
support.microsoft.com/kb/5007206
support.microsoft.com/kb/5007207
support.microsoft.com/kb/5007215
support.microsoft.com/kb/5007247
support.microsoft.com/kb/5007255
msrc.microsoft.com/update-guide/vulnerability/CVE-2021-26443
msrc.microsoft.com/update-guide/vulnerability/CVE-2021-36957
msrc.microsoft.com/update-guide/vulnerability/CVE-2021-38631
msrc.microsoft.com/update-guide/vulnerability/CVE-2021-38665
msrc.microsoft.com/update-guide/vulnerability/CVE-2021-38666
msrc.microsoft.com/update-guide/vulnerability/CVE-2021-41356
msrc.microsoft.com/update-guide/vulnerability/CVE-2021-41366
msrc.microsoft.com/update-guide/vulnerability/CVE-2021-41366
msrc.microsoft.com/update-guide/vulnerability/CVE-2021-41367
msrc.microsoft.com/update-guide/vulnerability/CVE-2021-41370
msrc.microsoft.com/update-guide/vulnerability/CVE-2021-41371
msrc.microsoft.com/update-guide/vulnerability/CVE-2021-41377
msrc.microsoft.com/update-guide/vulnerability/CVE-2021-41378
msrc.microsoft.com/update-guide/vulnerability/CVE-2021-41379
msrc.microsoft.com/update-guide/vulnerability/CVE-2021-42274
msrc.microsoft.com/update-guide/vulnerability/CVE-2021-42275
msrc.microsoft.com/update-guide/vulnerability/CVE-2021-42276
msrc.microsoft.com/update-guide/vulnerability/CVE-2021-42277
msrc.microsoft.com/update-guide/vulnerability/CVE-2021-42278
msrc.microsoft.com/update-guide/vulnerability/CVE-2021-42279
msrc.microsoft.com/update-guide/vulnerability/CVE-2021-42280
msrc.microsoft.com/update-guide/vulnerability/CVE-2021-42282
msrc.microsoft.com/update-guide/vulnerability/CVE-2021-42283
msrc.microsoft.com/update-guide/vulnerability/CVE-2021-42284
msrc.microsoft.com/update-guide/vulnerability/CVE-2021-42284
msrc.microsoft.com/update-guide/vulnerability/CVE-2021-42285
msrc.microsoft.com/update-guide/vulnerability/CVE-2021-42286
msrc.microsoft.com/update-guide/vulnerability/CVE-2021-42287
msrc.microsoft.com/update-guide/vulnerability/CVE-2021-42288
msrc.microsoft.com/update-guide/vulnerability/CVE-2021-42291
statistics.securelist.com/
threats.kaspersky.com/en/class/Exploit/
threats.kaspersky.com/en/product/Microsoft-Remote-Desktop/
threats.kaspersky.com/en/product/Microsoft-Windows-10/
threats.kaspersky.com/en/product/Microsoft-Windows-11/
threats.kaspersky.com/en/product/Microsoft-Windows-8/
threats.kaspersky.com/en/product/Microsoft-Windows-Server-2016/
threats.kaspersky.com/en/product/Microsoft-Windows-Server-2019/
threats.kaspersky.com/en/product/Microsoft-Windows-Server/
threats.kaspersky.com/en/product/Microsoft-Windows/
threats.kaspersky.com/en/product/Windows-RT/
7.7 High
CVSS2
Attack Vector
ADJACENT_NETWORK
Attack Complexity
LOW
Authentication
SINGLE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:A/AC:L/Au:S/C:C/I:C/A:C
9 High
CVSS3
Attack Vector
ADJACENT
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
CHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
9.7 High
AI Score
Confidence
High
0.904 High
EPSS
Percentile
98.8%