9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:C/I:C/A:C
0.96 High
EPSS
Percentile
99.4%
10/11/2016
Critical
Multiple serious vulnerabilities have been found in Microsoft Windows. Malicious users can exploit these vulnerabilities to execute arbitrary code, gain privileges or obtain sensitive information.
Microsoft Windows 10 1511, 1607
Microsoft Windows Vista Service Pack 2
Microsoft Windows Server 2008 Service Pack 2
Microsoft Windows 7 Service Pack 1
Microsoft Windows Server 2008 R2 Service Pack 1
Microsoft Windows 8.1
Microsoft Windows Server 2012
Microsoft Windows Server 2012 R2
Microsoft Windows RT 8.1
Microsoft Windows 10
Install necessary updates from the KB section, that are listed in your Windows Update (Windows Update usually can be accessed from the Control Panel)
CVE-2016-3270
CVE-2016-3263
CVE-2016-3209
CVE-2016-3262
CVE-2016-7182
CVE-2016-3396
CVE-2016-3393
CVE-2016-3298
CVE-2016-3376
CVE-2016-3341
CVE-2016-3266
CVE-2016-0070
CVE-2016-0073
CVE-2016-0075
CVE-2016-0079
CVE-2016-0142
CVE-2016-7211
CVE-2016-7188
CVE-2016-7185
ACE
4038788
3183431
3192441
3191203
3190847
3194798
3191256
3192440
3185331
3193515
3185332
3192393
3192392
3200970
Public exploits exist for this vulnerability.
support.microsoft.com/kb/3183431
support.microsoft.com/kb/3185331
support.microsoft.com/kb/3185332
support.microsoft.com/kb/3190847
support.microsoft.com/kb/3191203
support.microsoft.com/kb/3191256
support.microsoft.com/kb/3192392
support.microsoft.com/kb/3192393
support.microsoft.com/kb/3192440
support.microsoft.com/kb/3192441
support.microsoft.com/kb/3193515
support.microsoft.com/kb/3194798
support.microsoft.com/kb/3200970
support.microsoft.com/kb/4038788
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0070
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0073
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0075
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0079
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0142
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3209
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3262
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3263
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3298
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3341
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3376
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3393
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3396
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7185
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7188
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7211
portal.msrc.microsoft.com/en-us/security-guidance
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2016-0070
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2016-0073
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2016-0075
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2016-0079
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2016-0142
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2016-3209
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2016-3262
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2016-3263
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2016-3266
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2016-3270
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2016-3298
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2016-3341
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2016-3376
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2016-3393
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2016-3396
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2016-7182
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2016-7185
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2016-7188
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2016-7211
statistics.securelist.com/vulnerability-scan/month
threats.kaspersky.com/en/class/Exploit/
threats.kaspersky.com/en/product/Microsoft-Windows-10/
threats.kaspersky.com/en/product/Microsoft-Windows-7/
threats.kaspersky.com/en/product/Microsoft-Windows-8/
threats.kaspersky.com/en/product/Microsoft-Windows-Server-2008/
threats.kaspersky.com/en/product/Microsoft-Windows-Server-2012/
threats.kaspersky.com/en/product/Microsoft-Windows-Vista-4/
threats.kaspersky.com/en/product/Windows-RT/
9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:C/I:C/A:C
0.96 High
EPSS
Percentile
99.4%