8.5 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
LOW
User Interaction
NONE
Scope
CHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H
9.3 High
AI Score
Confidence
High
0.01 Low
EPSS
Percentile
83.7%
Multiple vulnerabilities were found in Microsoft Products (Extended Security Update). Malicious users can exploit these vulnerabilities to execute arbitrary code, gain privileges, cause denial of service, obtain sensitive information.
Below is a complete list of vulnerabilities:
Public exploits exist for this vulnerability.
Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.
CVE-2022-44668 critical
CVE-2022-41121 critical
CVE-2022-41094 critical
CVE-2022-44683 critical
CVE-2022-41076 critical
CVE-2022-44676 critical
CVE-2022-44667 critical
CVE-2022-44678 critical
CVE-2022-44682 high
CVE-2022-44681 critical
CVE-2022-44697 critical
CVE-2022-44670 critical
CVE-2022-44666 critical
CVE-2022-44707 high
CVE-2022-41077 critical
CVE-2022-44673 high
CVE-2022-44675 critical
CVE-2022-44679 high
CVE-2022-41074 high
CVE-2022-44680 critical
Install necessary updates from the KB section, that are listed in your Windows Update (Windows Update usually can be accessed from the Control Panel)
Arbitrary code execution. Exploitation of vulnerabilities with this impact can lead to executing by abuser any code or commands at vulnerable machine or process.
Obtain sensitive information. Exploitation of vulnerabilities with this impact can lead to capturing by abuser information, critical for user or system.
Denial of service. Exploitation of vulnerabilities with this impact can lead to loss of system availability or critical functional fault.
Privilege escalation. Exploitation of vulnerabilities with this impact can lead to performing by abuser actions, which are normally disallowed for current role.
support.microsoft.com/kb/5021285
support.microsoft.com/kb/5021288
support.microsoft.com/kb/5021289
support.microsoft.com/kb/5021291
support.microsoft.com/kb/5021293
support.microsoft.com/kb/5021294
support.microsoft.com/kb/5021296
support.microsoft.com/kb/5021303
support.microsoft.com/kb/5022338
support.microsoft.com/kb/5022339
support.microsoft.com/kb/5022340
support.microsoft.com/kb/5022343
support.microsoft.com/kb/5022346
support.microsoft.com/kb/5022348
support.microsoft.com/kb/5022352
support.microsoft.com/kb/5022353
msrc.microsoft.com/update-guide/en-US/advisory/ADV220005
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-41074
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-41076
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-41077
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-41094
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-41121
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-44666
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-44667
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-44668
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-44670
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-44673
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-44675
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-44676
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-44678
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-44679
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-44680
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-44681
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-44682
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-44683
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-44697
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-44707
statistics.securelist.com/
threats.kaspersky.com/en/class/Exploit/
threats.kaspersky.com/en/product/Microsoft-Windows-7/
threats.kaspersky.com/en/product/Microsoft-Windows-Server-2008/
threats.kaspersky.com/en/product/Microsoft-Windows-Server-2012/
threats.kaspersky.com/en/product/Microsoft-Windows-Server/
threats.kaspersky.com/en/product/Microsoft-Windows/
8.5 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
LOW
User Interaction
NONE
Scope
CHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H
9.3 High
AI Score
Confidence
High
0.01 Low
EPSS
Percentile
83.7%