9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
8.8 High
AI Score
Confidence
High
10 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:C/I:C/A:C
0.937 High
EPSS
Percentile
99.1%
06/14/2016
Critical
Multiple serious vulnerabilities have been found in Microsoft Windows. Malicious users can exploit these vulnerabilities to execute arbitrary code, bypass security restrictions, cause denial of service, gain privileges or obtain sensitive information.
Microsoft Windows Vista Service Pack 2
Microsoft Windows Server 2008 Service Pack 2
Microsoft Windows 7 Service Pack 1
Microsoft Windows Server 2008 R2 Service Pack 1
Microsoft Windows 8.1
Microsoft Windows Server 2012
Microsoft Windows Server 2012 R2
Microsoft Windows RT 8.1
Microsoft Windows 10
Microsoft Windows 10 Versioin 1511
Install necessary updates from the KB section, that are listed in your Windows Update (Windows Update usually can be accessed from the Control Panel)
CVE-2016-3215
CVE-2016-3213
CVE-2016-3203
CVE-2016-3201
CVE-2016-3220
CVE-2016-3219
CVE-2016-3218
CVE-2016-3216
CVE-2016-3299
CVE-2016-3236
CVE-2016-3232
CVE-2016-3231
CVE-2016-3228
CVE-2016-3227
CVE-2016-3225
CVE-2016-3223
CVE-2016-3221
ACE
CVE-2016-32155.5High
CVE-2016-32138.8Critical
CVE-2016-32037.8Critical
CVE-2016-32016.5High
CVE-2016-32207.8Critical
CVE-2016-32197.8Critical
CVE-2016-32187.8Critical
CVE-2016-32164.3Warning
CVE-2016-32995.3High
CVE-2016-32369.8Critical
CVE-2016-32325.0Warning
CVE-2016-32317.8Critical
CVE-2016-32288.8Critical
CVE-2016-32279.8Critical
CVE-2016-32257.8Critical
CVE-2016-32238.1Critical
CVE-2016-32217.8Critical
3162343
3161561
3163017
3163018
3159398
3161949
3161664
3164033
3164035
3164294
3157569
3161951
Public exploits exist for this vulnerability.
support.microsoft.com/kb/3157569
support.microsoft.com/kb/3159398
support.microsoft.com/kb/3161561
support.microsoft.com/kb/3161664
support.microsoft.com/kb/3161949
support.microsoft.com/kb/3161951
support.microsoft.com/kb/3162343
support.microsoft.com/kb/3163017
support.microsoft.com/kb/3163018
support.microsoft.com/kb/3164033
support.microsoft.com/kb/3164035
support.microsoft.com/kb/3164294
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3201
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3203
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3213
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3215
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3216
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3218
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3219
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3220
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3221
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3223
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3225
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3227
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3228
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3231
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3232
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3236
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3299
portal.msrc.microsoft.com/en-us/security-guidance
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2016-3201
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2016-3203
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2016-3213
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2016-3215
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2016-3216
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2016-3218
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2016-3219
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2016-3220
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2016-3221
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2016-3223
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2016-3225
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2016-3227
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2016-3228
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2016-3231
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2016-3232
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2016-3236
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2016-3299
statistics.securelist.com/vulnerability-scan/month
threats.kaspersky.com/en/class/Exploit/
threats.kaspersky.com/en/product/Microsoft-Windows-10/
threats.kaspersky.com/en/product/Microsoft-Windows-7/
threats.kaspersky.com/en/product/Microsoft-Windows-8/
threats.kaspersky.com/en/product/Microsoft-Windows-Server-2008/
threats.kaspersky.com/en/product/Microsoft-Windows-Server-2012/
threats.kaspersky.com/en/product/Microsoft-Windows-Vista-4/
threats.kaspersky.com/en/product/Windows-RT/
9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
8.8 High
AI Score
Confidence
High
10 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:C/I:C/A:C
0.937 High
EPSS
Percentile
99.1%