8.8 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
CHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
9.3 High
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:C/I:C/A:C
0.723 High
EPSS
Percentile
98.0%
08/08/2017
Critical
Multiple vulnerabilities were found in Microsoft Windows. Malicious users can exploit these vulnerabilities to gain privileges, execute arbitrary code, cause denial of service, obtain sensitive information.
Windows 7 for 32-bit Systems Service Pack 1
Windows 10 Version 1511 for 32-bit Systems
Windows 10 Version 1703 for x64-based Systems
Windows 7 for x64-based Systems Service Pack 1
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation)
Windows Server 2008 R2 for Itanium-Based Systems Service Pack 1
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)
Windows Server 2012 R2 (Server Core installation)
Windows 10 Version 1511 for x64-based Systems
Windows 8.1 for 32-bit systems
Windows Server 2012
Windows RT 8.1
Windows 10 Version 1607 for x64-based Systems
Windows 10 for 32-bit Systems
Windows Server 2016
Windows Server 2012 (Server Core installation)
Windows 10 Version 1607 for 32-bit Systems
Windows Server 2016 (Server Core installation)
Windows Server 2012 R2
Windows 10 for x64-based Systems
Windows Server 2008 for x64-based Systems Service Pack 2
Windows Server 2008 R2 for x64-based Systems Service Pack 1
Windows Server 2008 for 32-bit Systems Service Pack 2
Windows 10 Version 1703 for 32-bit Systems
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation)
Windows Server 2008 for Itanium-Based Systems Service Pack 2
Windows 8.1 for x64-based systems
Install necessary updates from the KB section, that are listed in your Windows Update (Windows Update usually can be accessed from the Control Panel)
CVE-2017-8593
CVE-2017-8591
CVE-2017-8620
CVE-2017-8664
CVE-2017-0250
CVE-2017-8633
CVE-2017-8623
CVE-2017-8622
CVE-2017-8668
CVE-2017-8627
CVE-2017-0293
CVE-2017-0174
CVE-2017-8666
CVE-2017-8673
CVE-2017-8624
ACE
CVE-2017-85936.9High
CVE-2017-85917.2High
CVE-2017-86209.3Critical
CVE-2017-86647.2High
CVE-2017-02509.3Critical
CVE-2017-86338.5Critical
CVE-2017-86236.8High
CVE-2017-86227.2High
CVE-2017-86682.1Warning
CVE-2017-86274.7Warning
CVE-2017-02937.6Critical
CVE-2017-01746.1High
CVE-2017-86662.1Warning
CVE-2017-86734.3Warning
CVE-2017-86247.2High
4034668
4034674
4034681
4034658
4034660
4034666
4034665
4034672
4041689
4041693
4041687
4041676
4041690
4041691
4042895
4041679
support.microsoft.com/kb/4034658
support.microsoft.com/kb/4034660
support.microsoft.com/kb/4034665
support.microsoft.com/kb/4034666
support.microsoft.com/kb/4034668
support.microsoft.com/kb/4034672
support.microsoft.com/kb/4034674
support.microsoft.com/kb/4034681
support.microsoft.com/kb/4041676
support.microsoft.com/kb/4041679
support.microsoft.com/kb/4041687
support.microsoft.com/kb/4041689
support.microsoft.com/kb/4041690
support.microsoft.com/kb/4041691
support.microsoft.com/kb/4041693
support.microsoft.com/kb/4042895
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0174
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0250
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0293
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8591
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8593
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8620
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8622
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8623
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8624
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8627
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8633
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8664
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8666
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8668
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8673
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2017-0174
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2017-0250
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2017-0293
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2017-8591
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2017-8593
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2017-8620
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2017-8622
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2017-8623
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2017-8624
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2017-8627
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2017-8633
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2017-8664
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2017-8666
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2017-8668
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2017-8673
portal.msrc.microsoft.com/en-us/security-guidance
statistics.securelist.com/vulnerability-scan/month
threats.kaspersky.com/en/product/Microsoft-Windows-10/
threats.kaspersky.com/en/product/Microsoft-Windows-7/
threats.kaspersky.com/en/product/Microsoft-Windows-8/
threats.kaspersky.com/en/product/Microsoft-Windows-Server-2008/
threats.kaspersky.com/en/product/Microsoft-Windows-Server-2012/
threats.kaspersky.com/en/product/Microsoft-Windows-Server/
threats.kaspersky.com/en/product/Microsoft-Windows/
8.8 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
CHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
9.3 High
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:C/I:C/A:C
0.723 High
EPSS
Percentile
98.0%