9.3 High
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:C/I:C/A:C
8.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
9.4 High
AI Score
Confidence
High
0.343 Low
EPSS
Percentile
97.1%
Multiple vulnerabilities were found in Microsoft Windows. Malicious users can exploit these vulnerabilities to gain privileges, obtain sensitive information, execute arbitrary code, cause denial of service.
Below is a complete list of vulnerabilities:
Public exploits exist for this vulnerability.
Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.
CVE-2022-22717 high
CVE-2022-21998 high
CVE-2022-22718 critical
CVE-2022-21926 critical
CVE-2022-22001 critical
CVE-2022-21981 critical
CVE-2022-22715 critical
CVE-2022-21995 critical
CVE-2022-22710 high
CVE-2022-21994 critical
CVE-2022-21974 critical
CVE-2022-21927 critical
CVE-2022-22002 high
CVE-2022-21997 high
CVE-2022-21996 critical
CVE-2022-21992 critical
CVE-2022-21985 high
CVE-2022-22712 high
CVE-2022-21971 critical
CVE-2022-21844 critical
CVE-2022-21984 critical
CVE-2022-21999 critical
CVE-2022-21993 critical
CVE-2022-21989 critical
CVE-2022-22709 critical
CVE-2022-22000 critical
Install necessary updates from the KB section, that are listed in your Windows Update (Windows Update usually can be accessed from the Control Panel)
Arbitrary code execution. Exploitation of vulnerabilities with this impact can lead to executing by abuser any code or commands at vulnerable machine or process.
Obtain sensitive information. Exploitation of vulnerabilities with this impact can lead to capturing by abuser information, critical for user or system.
Denial of service. Exploitation of vulnerabilities with this impact can lead to loss of system availability or critical functional fault.
Privilege escalation. Exploitation of vulnerabilities with this impact can lead to performing by abuser actions, which are normally disallowed for current role.
support.microsoft.com/kb/5010342
support.microsoft.com/kb/5010345
support.microsoft.com/kb/5010351
support.microsoft.com/kb/5010354
support.microsoft.com/kb/5010358
support.microsoft.com/kb/5010359
support.microsoft.com/kb/5010386
support.microsoft.com/kb/5010392
support.microsoft.com/kb/5010395
support.microsoft.com/kb/5010412
support.microsoft.com/kb/5010419
support.microsoft.com/kb/5010456
nvd.nist.gov/vuln/detail/CVE-2022-21844
nvd.nist.gov/vuln/detail/CVE-2022-21926
nvd.nist.gov/vuln/detail/CVE-2022-21927
nvd.nist.gov/vuln/detail/CVE-2022-21971
nvd.nist.gov/vuln/detail/CVE-2022-21974
nvd.nist.gov/vuln/detail/CVE-2022-21981
nvd.nist.gov/vuln/detail/CVE-2022-21984
nvd.nist.gov/vuln/detail/CVE-2022-21985
nvd.nist.gov/vuln/detail/CVE-2022-21989
nvd.nist.gov/vuln/detail/CVE-2022-21992
nvd.nist.gov/vuln/detail/CVE-2022-21993
nvd.nist.gov/vuln/detail/CVE-2022-21994
nvd.nist.gov/vuln/detail/CVE-2022-21995
nvd.nist.gov/vuln/detail/CVE-2022-21996
nvd.nist.gov/vuln/detail/CVE-2022-21997
nvd.nist.gov/vuln/detail/CVE-2022-21998
nvd.nist.gov/vuln/detail/CVE-2022-21999
nvd.nist.gov/vuln/detail/CVE-2022-22000
nvd.nist.gov/vuln/detail/CVE-2022-22001
nvd.nist.gov/vuln/detail/CVE-2022-22002
nvd.nist.gov/vuln/detail/CVE-2022-22709
nvd.nist.gov/vuln/detail/CVE-2022-22710
nvd.nist.gov/vuln/detail/CVE-2022-22712
nvd.nist.gov/vuln/detail/CVE-2022-22715
nvd.nist.gov/vuln/detail/CVE-2022-22717
nvd.nist.gov/vuln/detail/CVE-2022-22718
statistics.securelist.com/
threats.kaspersky.com/en/class/Exploit/
threats.kaspersky.com/en/product/Microsoft-Azure/
threats.kaspersky.com/en/product/Microsoft-Windows-10/
threats.kaspersky.com/en/product/Microsoft-Windows-7/
threats.kaspersky.com/en/product/Microsoft-Windows-8/
threats.kaspersky.com/en/product/Microsoft-Windows-Server-2008/
threats.kaspersky.com/en/product/Microsoft-Windows-Server-2012/
threats.kaspersky.com/en/product/Microsoft-Windows-Server-2016/
threats.kaspersky.com/en/product/Microsoft-Windows-Server-2019/
threats.kaspersky.com/en/product/Microsoft-Windows-Server/
threats.kaspersky.com/en/product/Microsoft-Windows/
threats.kaspersky.com/en/product/Windows-RT/
9.3 High
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:C/I:C/A:C
8.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
9.4 High
AI Score
Confidence
High
0.343 Low
EPSS
Percentile
97.1%