CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
AI Score
Confidence
High
EPSS
Percentile
88.9%
Multiple vulnerabilities were found in Microsoft Windows. Malicious users can exploit these vulnerabilities to gain privileges, execute arbitrary code, obtain sensitive information, bypass security restrictions, cause denial of service.
Below is a complete list of vulnerabilities:
Public exploits exist for this vulnerability.
Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.
CVE-2023-35382 critical
CVE-2023-38184 critical
CVE-2023-20569 warning
CVE-2023-36914 high
CVE-2023-35376 high
CVE-2023-35381 critical
CVE-2023-35377 high
CVE-2023-36911 critical
CVE-2023-35359 critical
CVE-2023-36909 high
CVE-2023-35378 high
CVE-2023-38154 critical
CVE-2023-36907 critical
CVE-2023-35386 critical
CVE-2023-36910 critical
CVE-2023-36906 critical
CVE-2023-35384 high
CVE-2023-38170 critical
CVE-2023-36908 high
CVE-2023-38254 high
CVE-2023-36900 critical
CVE-2023-36898 critical
CVE-2023-35387 critical
CVE-2023-36912 critical
CVE-2023-38186 critical
CVE-2023-35380 critical
CVE-2023-36904 critical
CVE-2023-36882 critical
CVE-2023-38172 critical
CVE-2023-36903 critical
CVE-2023-35383 critical
CVE-2023-36889 high
CVE-2023-35385 critical
CVE-2023-36905 critical
CVE-2023-36913 critical
Install necessary updates from the KB section, that are listed in your Windows Update (Windows Update usually can be accessed from the Control Panel)
Arbitrary code execution. Exploitation of vulnerabilities with this impact can lead to executing by abuser any code or commands at vulnerable machine or process.
Obtain sensitive information. Exploitation of vulnerabilities with this impact can lead to capturing by abuser information, critical for user or system.
Denial of service. Exploitation of vulnerabilities with this impact can lead to loss of system availability or critical functional fault.
Security bypass. Exploitation of vulnerabilities with this impact can lead to performing actions restricted by current security settings.
Privilege escalation. Exploitation of vulnerabilities with this impact can lead to performing by abuser actions, which are normally disallowed for current role.
support.microsoft.com/kb/5029242
support.microsoft.com/kb/5029244
support.microsoft.com/kb/5029247
support.microsoft.com/kb/5029250
support.microsoft.com/kb/5029253
support.microsoft.com/kb/5029259
support.microsoft.com/kb/5029263
support.microsoft.com/kb/5029367
msrc.microsoft.com/en-US/security-guidance/advisory/ADV230004
msrc.microsoft.com/update-guide/vulnerability/CVE-2023-20569
msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35359
msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35376
msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35377
msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35378
msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35380
msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35381
msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35382
msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35383
msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35384
msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35385
msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35386
msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35387
msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36882
msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36889
msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36898
msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36900
msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36903
msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36904
msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36905
msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36906
msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36907
msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36908
msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36909
msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36910
msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36911
msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36912
msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36913
msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36914
msrc.microsoft.com/update-guide/vulnerability/CVE-2023-38154
msrc.microsoft.com/update-guide/vulnerability/CVE-2023-38170
msrc.microsoft.com/update-guide/vulnerability/CVE-2023-38172
msrc.microsoft.com/update-guide/vulnerability/CVE-2023-38184
msrc.microsoft.com/update-guide/vulnerability/CVE-2023-38186
msrc.microsoft.com/update-guide/vulnerability/CVE-2023-38254
statistics.securelist.com/
threats.kaspersky.com/en/class/Exploit/
threats.kaspersky.com/en/product/Microsoft-Windows-10/
threats.kaspersky.com/en/product/Microsoft-Windows-11/
threats.kaspersky.com/en/product/Microsoft-Windows-Server-2012/
threats.kaspersky.com/en/product/Microsoft-Windows-Server-2016/
threats.kaspersky.com/en/product/Microsoft-Windows-Server-2019/
threats.kaspersky.com/en/product/Microsoft-Windows-Server/
threats.kaspersky.com/en/product/Microsoft-Windows/