8.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
9.8 High
AI Score
Confidence
High
0.499 Medium
EPSS
Percentile
97.5%
Multiple vulnerabilities were found in Microsoft Products (Extended Security Update). Malicious users can exploit these vulnerabilities to cause denial of service, gain privileges, execute arbitrary code, obtain sensitive information.
Below is a complete list of vulnerabilities:
Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.
CVE-2022-41058 warning
CVE-2022-37966 warning
CVE-2022-41090 warning
CVE-2022-41045 warning
CVE-2022-41118 warning
CVE-2022-41048 warning
CVE-2022-41098 warning
CVE-2022-41053 warning
CVE-2022-41116 warning
CVE-2022-41097 warning
CVE-2022-23824 warning
CVE-2022-41044 warning
CVE-2022-41073 warning
CVE-2022-41047 warning
CVE-2022-41086 warning
CVE-2022-37967 warning
CVE-2022-41128 warning
CVE-2022-37992 warning
CVE-2022-41109 warning
CVE-2022-41056 warning
CVE-2022-38023 warning
CVE-2022-41039 warning
CVE-2022-41057 warning
CVE-2022-41095 warning
CVE-2022-41093 warning
CVE-2022-41125 warning
CVE-2022-41088 warning
CVE-2022-41100 warning
Install necessary updates from the KB section, that are listed in your Windows Update (Windows Update usually can be accessed from the Control Panel)
Arbitrary code execution. Exploitation of vulnerabilities with this impact can lead to executing by abuser any code or commands at vulnerable machine or process.
Obtain sensitive information. Exploitation of vulnerabilities with this impact can lead to capturing by abuser information, critical for user or system.
Denial of service. Exploitation of vulnerabilities with this impact can lead to loss of system availability or critical functional fault.
Privilege escalation. Exploitation of vulnerabilities with this impact can lead to performing by abuser actions, which are normally disallowed for current role.
support.microsoft.com/kb/5019958
support.microsoft.com/kb/5020000
support.microsoft.com/kb/5020003
support.microsoft.com/kb/5020005
support.microsoft.com/kb/5020009
support.microsoft.com/kb/5020010
support.microsoft.com/kb/5020013
support.microsoft.com/kb/5020019
support.microsoft.com/kb/5020023
support.microsoft.com/kb/5028222
support.microsoft.com/kb/5028223
support.microsoft.com/kb/5028224
support.microsoft.com/kb/5028226
support.microsoft.com/kb/5028228
support.microsoft.com/kb/5028232
support.microsoft.com/kb/5028233
support.microsoft.com/kb/5028240
support.microsoft.com/kb/5031407
support.microsoft.com/kb/5031408
support.microsoft.com/kb/5031411
support.microsoft.com/kb/5031416
support.microsoft.com/kb/5031419
support.microsoft.com/kb/5031427
support.microsoft.com/kb/5031441
support.microsoft.com/kb/5031442
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-23824
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-37966
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-37967
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-37992
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-38023
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-41039
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-41044
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-41045
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-41047
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-41048
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-41053
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-41056
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-41057
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-41058
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-41073
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-41086
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-41088
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-41090
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-41093
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-41095
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-41097
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-41098
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-41100
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-41109
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-41116
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-41118
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-41125
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-41128
statistics.securelist.com/
threats.kaspersky.com/en/class/Exploit/
threats.kaspersky.com/en/product/Microsoft-Windows-7/
threats.kaspersky.com/en/product/Microsoft-Windows-Server-2008/
threats.kaspersky.com/en/product/Microsoft-Windows-Server-2012/
threats.kaspersky.com/en/product/Microsoft-Windows-Server/
threats.kaspersky.com/en/product/Microsoft-Windows/
8.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
9.8 High
AI Score
Confidence
High
0.499 Medium
EPSS
Percentile
97.5%