9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:C/I:C/A:C
0.975 High
EPSS
Percentile
100.0%
06/13/2017
Critical
Multiple vulnerabilities were found in Microsoft Windows. Malicious users can exploit these vulnerabilities to bypass security restrictions, obtain sensitive information, gain privileges, execute arbitrary code.
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation)
Windows 10 for 32-bit Systems
Windows 10 for x64-based Systems
Windows Server 2012 (Server Core installation)
Windows Server 2016 (Server Core installation)
Windows 7 for x64-based Systems Service Pack 1
Windows 8.1 for 32-bit systems
Windows Server 2008 for 32-bit Systems Service Pack 2
Windows 8.1 for x64-based systems
Windows Server 2012
Windows Server 2008 for x64-based Systems Service Pack 2
Microsoft Word 2013 Service Pack 1 (32-bit editions)
Windows Server 2016
Windows RT 8.1
Windows Server 2008 for Itanium-Based Systems Service Pack 2
Windows 10 Version 1703 for x64-based Systems
Windows Server 2012 R2 (Server Core installation)
Windows Server 2008 R2 for Itanium-Based Systems Service Pack 1
Windows 10 Version 1511 for 32-bit Systems
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation)
Windows 10 Version 1511 for x64-based Systems
Windows 10 Version 1607 for 32-bit Systems
Windows 10 Version 1607 for x64-based Systems
Windows 7 for 32-bit Systems Service Pack 1
Windows Server 2008 R2 for x64-based Systems Service Pack 1
Windows 10 Version 1703 for 32-bit Systems
Windows Server 2012 R2
Install necessary updates from the KB section, that are listed in your Windows Update (Windows Update usually can be accessed from the Control Panel)
CVE-2017-0219
CVE-2017-0218
CVE-2017-0215
CVE-2017-0216
CVE-2017-0173
CVE-2017-8483
CVE-2017-8466
CVE-2017-8543
CVE-2017-8488
CVE-2017-8460
CVE-2017-0289
CVE-2017-0288
CVE-2017-8528
CVE-2017-8527
CVE-2017-0283
CVE-2017-0282
CVE-2017-0287
CVE-2017-0285
CVE-2017-0284
CVE-2017-0193
CVE-2017-8464
CVE-2017-8470
CVE-2017-8471
CVE-2017-8472
CVE-2017-8473
CVE-2017-8475
CVE-2017-0294
CVE-2017-0296
CVE-2017-0291
CVE-2017-0292
CVE-2017-8531
CVE-2017-8533
CVE-2017-8532
ACE
4022714
4022727
4022715
4025342
4025339
4034668
4034674
4034681
4034658
4034660
4034666
4034665
4034672
The following public exploits exists for this vulnerability:
support.microsoft.com/kb/4022714
support.microsoft.com/kb/4022715
support.microsoft.com/kb/4022727
support.microsoft.com/kb/4025339
support.microsoft.com/kb/4025342
support.microsoft.com/kb/4034658
support.microsoft.com/kb/4034660
support.microsoft.com/kb/4034665
support.microsoft.com/kb/4034666
support.microsoft.com/kb/4034668
support.microsoft.com/kb/4034672
support.microsoft.com/kb/4034674
support.microsoft.com/kb/4034681
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0173
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0193
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0215
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0216
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0218
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0219
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0282
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0284
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0285
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0287
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0288
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0289
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0291
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0292
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0294
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0296
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8460
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8464
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8466
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8470
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8471
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8472
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8473
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8475
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8527
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8528
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8531
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8532
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8533
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2017-0173
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2017-0193
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2017-0215
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2017-0216
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2017-0218
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2017-0219
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2017-0282
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2017-0283
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2017-0284
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2017-0285
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2017-0287
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2017-0288
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2017-0289
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2017-0291
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2017-0292
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2017-0294
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2017-0296
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2017-8460
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2017-8464
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2017-8466
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2017-8470
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2017-8471
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2017-8472
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2017-8473
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2017-8475
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2017-8483
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2017-8488
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2017-8527
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2017-8528
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2017-8531
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2017-8532
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2017-8533
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2017-8543
portal.msrc.microsoft.com/en-us/security-guidance
statistics.securelist.com/vulnerability-scan/month
threats.kaspersky.com/en/class/Exploit/
threats.kaspersky.com/en/product/Microsoft-Windows-10/
threats.kaspersky.com/en/product/Microsoft-Windows-7/
threats.kaspersky.com/en/product/Microsoft-Windows-8/
threats.kaspersky.com/en/product/Microsoft-Windows-Server-2008/
threats.kaspersky.com/en/product/Microsoft-Windows-Server-2012/
threats.kaspersky.com/en/product/Microsoft-Windows-Server/
threats.kaspersky.com/en/product/Microsoft-Windows/
threats.kaspersky.com/en/product/Microsoft-Word/
threats.kaspersky.com/en/product/Windows-RT/
www.exploit-db.com/exploits/42212
www.exploit-db.com/exploits/42223
www.exploit-db.com/exploits/42224
www.exploit-db.com/exploits/42225
www.exploit-db.com/exploits/42226
www.exploit-db.com/exploits/42234
www.exploit-db.com/exploits/42235
www.exploit-db.com/exploits/42236
www.exploit-db.com/exploits/42237
www.exploit-db.com/exploits/42239
www.exploit-db.com/exploits/42240
www.exploit-db.com/exploits/42241
www.exploit-db.com/exploits/42243
www.exploit-db.com/exploits/42382
www.exploit-db.com/exploits/42429
9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:C/I:C/A:C
0.975 High
EPSS
Percentile
100.0%