9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.6 High
AI Score
Confidence
High
0.186 Low
EPSS
Percentile
96.3%
Multiple vulnerabilities were found in Microsoft Products (Extended Security Update). Malicious users can exploit these vulnerabilities to obtain sensitive information, bypass security restrictions, gain privileges, cause denial of service, execute arbitrary code.
Below is a complete list of vulnerabilities:
Public exploits exist for this vulnerability.
Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.
CVE-2023-29324 high
CVE-2023-24946 critical
CVE-2023-24900 high
CVE-2023-29325 critical
CVE-2023-24932 high
CVE-2023-24943 critical
CVE-2023-24945 high
CVE-2023-24942 critical
CVE-2023-28251 high
CVE-2023-28283 critical
CVE-2023-24940 critical
CVE-2023-24903 critical
CVE-2023-29336 critical
CVE-2023-24904 high
Install necessary updates from the KB section, that are listed in your Windows Update (Windows Update usually can be accessed from the Control Panel)
Arbitrary code execution. Exploitation of vulnerabilities with this impact can lead to executing by abuser any code or commands at vulnerable machine or process.
Obtain sensitive information. Exploitation of vulnerabilities with this impact can lead to capturing by abuser information, critical for user or system.
Denial of service. Exploitation of vulnerabilities with this impact can lead to loss of system availability or critical functional fault.
Security bypass. Exploitation of vulnerabilities with this impact can lead to performing actions restricted by current security settings.
Privilege escalation. Exploitation of vulnerabilities with this impact can lead to performing by abuser actions, which are normally disallowed for current role.
support.microsoft.com/kb/5026366
support.microsoft.com/kb/5026408
support.microsoft.com/kb/5026413
support.microsoft.com/kb/5026426
support.microsoft.com/kb/5026427
support.microsoft.com/kb/5028222
support.microsoft.com/kb/5028226
support.microsoft.com/kb/5028240
msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24900
msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24903
msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24904
msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24932
msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24940
msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24942
msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24943
msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24945
msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24946
msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28251
msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28283
msrc.microsoft.com/update-guide/vulnerability/CVE-2023-29324
msrc.microsoft.com/update-guide/vulnerability/CVE-2023-29325
msrc.microsoft.com/update-guide/vulnerability/CVE-2023-29336
statistics.securelist.com/
threats.kaspersky.com/en/class/Exploit/
threats.kaspersky.com/en/product/Microsoft-Windows-Server-2008/
threats.kaspersky.com/en/product/Microsoft-Windows-Server/
threats.kaspersky.com/en/product/Microsoft-Windows/
9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.6 High
AI Score
Confidence
High
0.186 Low
EPSS
Percentile
96.3%