8.5 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
LOW
User Interaction
NONE
Scope
CHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H
9.4 High
AI Score
Confidence
High
0.023 Low
EPSS
Percentile
89.7%
Multiple vulnerabilities were found in Microsoft Windows. Malicious users can exploit these vulnerabilities to gain privileges, bypass security restrictions, execute arbitrary code, obtain sensitive information, cause denial of service.
Below is a complete list of vulnerabilities:
Public exploits exist for this vulnerability.
Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.
CVE-2022-44669 high
CVE-2022-44698 high
CVE-2022-44668 critical
CVE-2022-44689 critical
CVE-2022-44677 critical
CVE-2022-44674 high
CVE-2022-41121 critical
CVE-2022-41094 critical
CVE-2022-44683 critical
CVE-2022-41076 critical
CVE-2022-44676 critical
CVE-2022-44667 critical
CVE-2022-44710 critical
CVE-2022-44678 critical
CVE-2022-44682 high
CVE-2022-44681 critical
CVE-2022-44697 critical
CVE-2022-44671 critical
CVE-2022-44687 critical
CVE-2022-44670 critical
CVE-2022-44666 critical
CVE-2022-44707 high
CVE-2022-41077 critical
CVE-2022-44673 high
CVE-2022-44675 critical
CVE-2022-44679 high
CVE-2022-41074 high
CVE-2022-44680 critical ADV220005 unknown
CVE-2022-44684 high
Install necessary updates from the KB section, that are listed in your Windows Update (Windows Update usually can be accessed from the Control Panel)
Arbitrary code execution. Exploitation of vulnerabilities with this impact can lead to executing by abuser any code or commands at vulnerable machine or process.
Obtain sensitive information. Exploitation of vulnerabilities with this impact can lead to capturing by abuser information, critical for user or system.
Denial of service. Exploitation of vulnerabilities with this impact can lead to loss of system availability or critical functional fault.
Security bypass. Exploitation of vulnerabilities with this impact can lead to performing actions restricted by current security settings.
Privilege escalation. Exploitation of vulnerabilities with this impact can lead to performing by abuser actions, which are normally disallowed for current role.
support.microsoft.com/kb/5021233
support.microsoft.com/kb/5021234
support.microsoft.com/kb/5021235
support.microsoft.com/kb/5021237
support.microsoft.com/kb/5021243
support.microsoft.com/kb/5021249
support.microsoft.com/kb/5021255
support.microsoft.com/kb/5021294
support.microsoft.com/kb/5021296
support.microsoft.com/kb/5022282
support.microsoft.com/kb/5022286
support.microsoft.com/kb/5022287
support.microsoft.com/kb/5022289
support.microsoft.com/kb/5022291
support.microsoft.com/kb/5022297
support.microsoft.com/kb/5022303
support.microsoft.com/kb/5022346
support.microsoft.com/kb/5022352
msrc.microsoft.com/update-guide/en-US/advisory/CVE-2022-44684
msrc.microsoft.com/update-guide/en-US/vulnerability/ADV220005
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-41074
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-41076
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-41077
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-41094
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-41121
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-44666
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-44667
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-44668
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-44669
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-44670
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-44671
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-44673
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-44674
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-44675
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-44676
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-44677
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-44678
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-44679
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-44680
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-44681
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-44682
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-44683
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-44687
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-44689
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-44697
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-44698
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-44707
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-44710
statistics.securelist.com/
threats.kaspersky.com/en/class/Exploit/
threats.kaspersky.com/en/product/Microsoft-Azure/
threats.kaspersky.com/en/product/Microsoft-Windows-10/
threats.kaspersky.com/en/product/Microsoft-Windows-11/
threats.kaspersky.com/en/product/Microsoft-Windows-8/
threats.kaspersky.com/en/product/Microsoft-Windows-Server-2012/
threats.kaspersky.com/en/product/Microsoft-Windows-Server-2016/
threats.kaspersky.com/en/product/Microsoft-Windows-Server-2019/
threats.kaspersky.com/en/product/Microsoft-Windows-Server/
threats.kaspersky.com/en/product/Microsoft-Windows/
threats.kaspersky.com/en/product/Windows-RT/
8.5 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
LOW
User Interaction
NONE
Scope
CHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H
9.4 High
AI Score
Confidence
High
0.023 Low
EPSS
Percentile
89.7%