9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
8.9 High
AI Score
Confidence
High
10 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:C/I:C/A:C
0.799 High
EPSS
Percentile
98.2%
10/10/2017
Critical
Multiple vulnerabilities were found in Microsoft Windows. Malicious users can exploit these vulnerabilities to execute arbitrary code, obtain sensitive information, cause denial of service, gain privileges, bypass security restrictions.
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation)
Windows 10 for 32-bit Systems
Windows 10 for x64-based Systems
Windows Server 2012 (Server Core installation)
Windows Server 2016 (Server Core installation)
Windows 7 for x64-based Systems Service Pack 1
Windows 8.1 for 32-bit systems
Windows Server 2008 for 32-bit Systems Service Pack 2
Windows 8.1 for x64-based systems
Windows Server 2012
Windows Server 2008 for x64-based Systems Service Pack 2
Windows Server 2016
Windows RT 8.1
Windows Server 2008 for Itanium-Based Systems Service Pack 2
Windows 10 Version 1703 for x64-based Systems
Windows Server 2012 R2 (Server Core installation)
Windows Server 2008 R2 for Itanium-Based Systems Service Pack 1
Windows 10 Version 1511 for 32-bit Systems
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation)
Windows 10 Version 1511 for x64-based Systems
Windows 10 Version 1607 for 32-bit Systems
Windows 10 Version 1607 for x64-based Systems
Windows 7 for 32-bit Systems Service Pack 1
Windows Server 2008 R2 for x64-based Systems Service Pack 1
Windows 10 Version 1703 for 32-bit Systems
Windows Server 2012 R2
Install necessary updates from the KB section, that are listed in your Windows Update (Windows Update usually can be accessed from the Control Panel)
CVE-2017-11762
CVE-2017-11763
CVE-2017-11765
CVE-2017-11769
CVE-2017-11771
CVE-2017-11772
CVE-2017-11779
CVE-2017-11780
CVE-2017-11781
CVE-2017-11782
CVE-2017-11783
CVE-2017-11784
CVE-2017-11785
CVE-2017-11814
CVE-2017-11815
CVE-2017-11816
CVE-2017-11817
CVE-2017-11818
CVE-2017-11823
CVE-2017-11824
CVE-2017-11829
CVE-2017-8689
CVE-2017-8693
CVE-2017-8694
CVE-2017-8703
CVE-2017-8715
CVE-2017-8717
CVE-2017-8718
CVE-2017-8727
ADV170012
ADV170014
ACE
CVE-2017-117626.8High
CVE-2017-117636.8High
CVE-2017-117652.1Warning
CVE-2017-117699.3Critical
CVE-2017-117725.0Warning
CVE-2017-117799.3Critical
CVE-2017-117806.8High
CVE-2017-117817.8Critical
CVE-2017-117824.6Warning
CVE-2017-117836.9High
CVE-2017-117842.1Warning
CVE-2017-117852.1Warning
CVE-2017-118142.1Warning
CVE-2017-118153.5Warning
CVE-2017-118162.1Warning
CVE-2017-118171.9Warning
CVE-2017-118184.4Warning
CVE-2017-118237.2High
CVE-2017-118246.9High
CVE-2017-118292.1Warning
CVE-2017-86896.9High
CVE-2017-86932.1Warning
CVE-2017-86946.9High
CVE-2017-87034.9Warning
CVE-2017-87154.6Warning
CVE-2017-87179.3Critical
CVE-2017-87189.3Critical
CVE-2017-87277.6Critical
4038793
4041689
4041693
4041687
4041676
4041690
4041691
4042895
4041679
4048955
Public exploits exist for this vulnerability.
support.microsoft.com/kb/4038793
support.microsoft.com/kb/4041676
support.microsoft.com/kb/4041679
support.microsoft.com/kb/4041687
support.microsoft.com/kb/4041689
support.microsoft.com/kb/4041690
support.microsoft.com/kb/4041691
support.microsoft.com/kb/4041693
support.microsoft.com/kb/4042895
support.microsoft.com/kb/4048955
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11762
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11763
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11765
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11769
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11772
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11779
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11780
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11781
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11782
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11783
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11784
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11785
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11814
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11815
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11816
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11817
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11818
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11823
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11824
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11829
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8689
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8693
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8694
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8703
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8715
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8717
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8718
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8727
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2017-11762
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2017-11763
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2017-11765
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2017-11769
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2017-11771
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2017-11772
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2017-11779
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2017-11780
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2017-11781
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2017-11782
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2017-11783
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2017-11784
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2017-11785
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2017-11814
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2017-11815
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2017-11816
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2017-11817
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2017-11818
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2017-11823
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2017-11824
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2017-11829
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2017-8689
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2017-8693
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2017-8694
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2017-8703
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2017-8715
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2017-8717
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2017-8718
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2017-8727
portal.msrc.microsoft.com/en-us/security-guidance
portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV170012
portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV170014
statistics.securelist.com/vulnerability-scan/month
threats.kaspersky.com/en/class/Exploit/
threats.kaspersky.com/en/product/Microsoft-Windows-10/
threats.kaspersky.com/en/product/Microsoft-Windows-7/
threats.kaspersky.com/en/product/Microsoft-Windows-8/
threats.kaspersky.com/en/product/Microsoft-Windows-Server-2008/
threats.kaspersky.com/en/product/Microsoft-Windows-Server-2012/
threats.kaspersky.com/en/product/Microsoft-Windows-Server/
threats.kaspersky.com/en/product/Microsoft-Windows/
threats.kaspersky.com/en/product/Windows-RT/
9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
8.9 High
AI Score
Confidence
High
10 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:C/I:C/A:C
0.799 High
EPSS
Percentile
98.2%