8.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
9.1 High
AI Score
Confidence
High
0.004 Low
EPSS
Percentile
75.1%
Multiple vulnerabilities were found in Microsoft Products (Extended Security Update). Malicious users can exploit these vulnerabilities to spoof user interface, obtain sensitive information, bypass security restrictions, gain privileges, cause denial of service, execute arbitrary code.
Below is a complete list of vulnerabilities:
Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.
CVE-2024-21320 high
CVE-2024-20680 high
CVE-2024-20674 critical
CVE-2024-20692 high
CVE-2024-21313 high
CVE-2024-20652 critical
CVE-2024-20657 high
CVE-2024-20660 high
CVE-2024-20664 high
CVE-2024-20662 warning
CVE-2024-20661 critical
CVE-2024-20691 warning
CVE-2024-20683 critical
CVE-2024-20654 critical
CVE-2024-21307 critical
CVE-2024-21314 high
CVE-2024-20653 critical
CVE-2024-20663 high
CVE-2024-20658 critical
CVE-2024-20655 high
CVE-2024-21311 high
CVE-2024-20682 critical
Install necessary updates from the KB section, that are listed in your Windows Update (Windows Update usually can be accessed from the Control Panel)
Arbitrary code execution. Exploitation of vulnerabilities with this impact can lead to executing by abuser any code or commands at vulnerable machine or process.
Obtain sensitive information. Exploitation of vulnerabilities with this impact can lead to capturing by abuser information, critical for user or system.
Denial of service. Exploitation of vulnerabilities with this impact can lead to loss of system availability or critical functional fault.
Security bypass. Exploitation of vulnerabilities with this impact can lead to performing actions restricted by current security settings.
Privilege escalation. Exploitation of vulnerabilities with this impact can lead to performing by abuser actions, which are normally disallowed for current role.
Spoof user interface. Exploitation of vulnerabilities with this impact can lead to changes in user interface to beguile user into inaccurate behavior.
support.microsoft.com/kb/5034120
support.microsoft.com/kb/5034167
support.microsoft.com/kb/5034169
support.microsoft.com/kb/5034171
support.microsoft.com/kb/5034173
support.microsoft.com/kb/5034176
support.microsoft.com/kb/5034184
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-20652
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-20653
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-20654
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-20655
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-20657
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-20658
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-20660
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-20661
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-20662
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-20663
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-20664
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-20674
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-20680
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-20682
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-20683
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-20691
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-20692
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21307
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21311
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21313
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21314
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21320
statistics.securelist.com/
threats.kaspersky.com/en/class/Exploit/
threats.kaspersky.com/en/product/Microsoft-Windows-Server-2008/
threats.kaspersky.com/en/product/Microsoft-Windows-Server-2012/
threats.kaspersky.com/en/product/Microsoft-Windows-Server/
threats.kaspersky.com/en/product/Microsoft-Windows/
8.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
9.1 High
AI Score
Confidence
High
0.004 Low
EPSS
Percentile
75.1%