9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:C/I:C/A:C
0.975 High
EPSS
Percentile
100.0%
06/13/2019
Critical
Multiple vulnerabilities were found in Microsoft Windows. Malicious users can exploit these vulnerabilities to execute arbitrary code, bypass security restrictions, obtain sensitive information, gain privileges.
Windows 7 for 32-bit Systems Service Pack 1
Windows 10 Version 1511 for 32-bit Systems
Windows 10 Version 1703 for x64-based Systems
Windows 7 for x64-based Systems Service Pack 1
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation)
Windows Server 2008 R2 for Itanium-Based Systems Service Pack 1
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)
Windows Server 2012 R2 (Server Core installation)
Windows 10 Version 1511 for x64-based Systems
Windows 8.1 for 32-bit systems
Windows Server 2012
Windows RT 8.1
Windows 10 Version 1607 for x64-based Systems
Windows 10 for 32-bit Systems
Windows Server 2012 (Server Core installation)
Windows Server 2016
Windows 10 Version 1607 for 32-bit Systems
Windows Server 2012 R2
Windows Server 2016 (Server Core installation)
Windows 10 for x64-based Systems
Windows Server 2008 for x64-based Systems Service Pack 2
Windows Server 2008 R2 for x64-based Systems Service Pack 1
Windows Server 2008 for 32-bit Systems Service Pack 2
Windows 10 Version 1703 for 32-bit Systems
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation)
Windows Server 2008 for Itanium-Based Systems Service Pack 2
Windows 8.1 for x64-based systems
Install necessary updates from the KB section, that are listed in your Windows Update (Windows Update usually can be accessed from the Control Panel)
CVE-2017-8543
CVE-2017-0219
CVE-2017-0284
CVE-2017-0218
CVE-2017-0215
CVE-2017-8479
CVE-2017-0299
CVE-2017-8485
CVE-2017-0193
CVE-2017-8478
CVE-2017-8488
CVE-2017-8528
CVE-2017-8460
CVE-2017-8475
CVE-2017-8476
CVE-2017-8470
CVE-2017-8494
CVE-2017-8466
CVE-2017-8464
CVE-2017-0291
CVE-2017-0216
CVE-2017-0292
CVE-2017-8480
CVE-2017-8489
CVE-2017-0285
CVE-2017-0300
CVE-2017-8491
CVE-2017-8471
CVE-2017-8477
CVE-2017-8462
CVE-2017-0173
CVE-2017-0294
CVE-2017-8472
CVE-2017-8482
CVE-2017-8492
CVE-2017-8490
CVE-2017-8483
CVE-2017-0283
CVE-2017-8484
CVE-2017-8481
CVE-2017-8468
CVE-2017-0282
CVE-2017-8469
CVE-2017-8474
CVE-2017-8465
CVE-2017-0297
CVE-2017-0296
CVE-2017-8473
CVE-2017-8531
CVE-2017-0289
CVE-2017-0288
CVE-2017-8527
CVE-2017-0287
CVE-2017-8533
CVE-2017-8532
ACE
4022726
4022714
4022724
4022727
4022715
4025342
4025339
4034668
4034674
4034681
4034658
4034660
4022725
4022717
4022718
4034666
4034665
4034672
Public exploits exist for this vulnerability.
support.microsoft.com/kb/4022714
support.microsoft.com/kb/4022715
support.microsoft.com/kb/4022717
support.microsoft.com/kb/4022718
support.microsoft.com/kb/4022724
support.microsoft.com/kb/4022725
support.microsoft.com/kb/4022726
support.microsoft.com/kb/4022727
support.microsoft.com/kb/4025339
support.microsoft.com/kb/4025342
support.microsoft.com/kb/4034658
support.microsoft.com/kb/4034660
support.microsoft.com/kb/4034665
support.microsoft.com/kb/4034666
support.microsoft.com/kb/4034668
support.microsoft.com/kb/4034672
support.microsoft.com/kb/4034674
support.microsoft.com/kb/4034681
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0173
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0193
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0215
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0216
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0218
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0219
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0282
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0283
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0284
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0285
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0287
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0288
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0289
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0291
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0292
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0294
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0296
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0297
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0299
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0300
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8460
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8462
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8464
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8465
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8466
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8468
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8469
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8470
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8471
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8472
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8473
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8474
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8475
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8476
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8477
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8478
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8479
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8480
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8481
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8482
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8483
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8484
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8485
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8488
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8489
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8490
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8491
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8492
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8494
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8527
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8528
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8531
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8532
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8533
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2017-0173
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2017-0193
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2017-0215
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2017-0216
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2017-0218
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2017-0219
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2017-0282
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2017-0283
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2017-0284
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2017-0285
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2017-0287
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2017-0288
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2017-0289
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2017-0291
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2017-0292
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2017-0294
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2017-0296
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2017-0297
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2017-0299
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2017-0300
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2017-8460
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2017-8462
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2017-8464
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2017-8465
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2017-8466
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2017-8468
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2017-8469
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2017-8470
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2017-8471
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2017-8472
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2017-8473
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2017-8474
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2017-8475
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2017-8476
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2017-8477
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2017-8478
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2017-8479
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2017-8480
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2017-8481
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2017-8482
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2017-8483
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2017-8484
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2017-8485
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2017-8488
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2017-8489
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2017-8490
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2017-8491
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2017-8492
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2017-8494
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2017-8527
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2017-8528
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2017-8531
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2017-8532
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2017-8533
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2017-8543
portal.msrc.microsoft.com/en-us/security-guidance
statistics.securelist.com/vulnerability-scan/month
threats.kaspersky.com/en/class/Exploit/
threats.kaspersky.com/en/product/Microsoft-Windows-10/
threats.kaspersky.com/en/product/Microsoft-Windows-7/
threats.kaspersky.com/en/product/Microsoft-Windows-8/
threats.kaspersky.com/en/product/Microsoft-Windows-Server-2008/
threats.kaspersky.com/en/product/Microsoft-Windows-Server-2012/
threats.kaspersky.com/en/product/Microsoft-Windows-Server/
threats.kaspersky.com/en/product/Microsoft-Windows/
threats.kaspersky.com/en/product/Microsoft-Word/
threats.kaspersky.com/en/product/Windows-RT/
9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:C/I:C/A:C
0.975 High
EPSS
Percentile
100.0%