8.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
9.9 High
AI Score
Confidence
High
0.005 Low
EPSS
Percentile
77.4%
Multiple vulnerabilities were found in Microsoft Windows. Malicious users can exploit these vulnerabilities to gain privileges, obtain sensitive information, bypass security restrictions, execute arbitrary code, cause denial of service, spoof user interface.
Below is a complete list of vulnerabilities:
Public exploits exist for this vulnerability.
Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.
CVE-2022-35737 critical
CVE-2024-21320 high
CVE-2024-20680 high
CVE-2024-20674 critical
CVE-2024-20692 high
CVE-2024-21313 high
CVE-2024-20652 critical
CVE-2024-20657 high
CVE-2024-20660 high
CVE-2024-20664 high
CVE-2024-20662 warning
CVE-2024-20661 critical
CVE-2024-20691 warning
CVE-2024-20683 critical
CVE-2024-20654 critical
CVE-2024-21307 critical
CVE-2024-21314 high
CVE-2024-20653 critical
CVE-2024-20663 high
CVE-2024-20658 critical
CVE-2024-20655 high
CVE-2024-21311 high
CVE-2024-20682 critical
CVE-2024-20686 critical
CVE-2024-21305 warning
CVE-2024-21310 critical
CVE-2024-21325 critical
CVE-2024-20699 high
CVE-2024-20694 high
CVE-2024-20666 high
CVE-2024-21309 critical
CVE-2024-20697 high
CVE-2024-21316 high
CVE-2024-20690 high
CVE-2024-20700 critical
CVE-2024-20696 high
CVE-2024-20687 critical
CVE-2024-20698 critical
CVE-2024-21306 high
CVE-2024-20681 critical
Install necessary updates from the KB section, that are listed in your Windows Update (Windows Update usually can be accessed from the Control Panel)
Arbitrary code execution. Exploitation of vulnerabilities with this impact can lead to executing by abuser any code or commands at vulnerable machine or process.
Obtain sensitive information. Exploitation of vulnerabilities with this impact can lead to capturing by abuser information, critical for user or system.
Denial of service. Exploitation of vulnerabilities with this impact can lead to loss of system availability or critical functional fault.
Security bypass. Exploitation of vulnerabilities with this impact can lead to performing actions restricted by current security settings.
Privilege escalation. Exploitation of vulnerabilities with this impact can lead to performing by abuser actions, which are normally disallowed for current role.
Spoof user interface. Exploitation of vulnerabilities with this impact can lead to changes in user interface to beguile user into inaccurate behavior.
support.microsoft.com/kb/5034119
support.microsoft.com/kb/5034121
support.microsoft.com/kb/5034122
support.microsoft.com/kb/5034123
support.microsoft.com/kb/5034127
support.microsoft.com/kb/5034129
support.microsoft.com/kb/5034130
support.microsoft.com/kb/5034134
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35737
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-20652
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-20653
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-20654
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-20655
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-20657
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-20658
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-20660
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-20661
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-20662
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-20663
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-20664
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-20666
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-20674
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-20680
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-20681
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-20682
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-20683
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-20686
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-20687
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-20690
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-20691
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-20692
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-20694
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-20696
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-20697
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-20698
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-20699
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-20700
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21305
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21306
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21307
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21309
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21310
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21311
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21313
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21314
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21316
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21320
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21325
statistics.securelist.com/
threats.kaspersky.com/en/class/Exploit/
threats.kaspersky.com/en/product/Microsoft-Windows-10/
threats.kaspersky.com/en/product/Microsoft-Windows-11/
threats.kaspersky.com/en/product/Microsoft-Windows-Server-2016/
threats.kaspersky.com/en/product/Microsoft-Windows-Server-2019/
threats.kaspersky.com/en/product/Microsoft-Windows-Server/
threats.kaspersky.com/en/product/Microsoft-Windows/
8.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
9.9 High
AI Score
Confidence
High
0.005 Low
EPSS
Percentile
77.4%