7.8 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
7.6 High
CVSS2
Access Vector
NETWORK
Access Complexity
HIGH
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:H/Au:N/C:C/I:C/A:C
0.194 Low
EPSS
Percentile
96.2%
02/13/2018
Critical
Multiple vulnerabilities were found in Microsoft Windows. Malicious users can exploit these vulnerabilities to gain privileges, obtain sensitive information, execute arbitrary code, bypass security restrictions, cause denial of service.
Windows Server 2016 (Server Core installation)
Windows 10 Version 1709 for x64-based Systems
Windows Server, version 1709 (Server Core Installation)
Install necessary updates from the KB section, that are listed in your Windows Update (Windows Update usually can be accessed from the Control Panel)
CVE-2018-0742
CVE-2018-0756
CVE-2018-0757
CVE-2018-0760
CVE-2018-0809
CVE-2018-0810
CVE-2018-0820
CVE-2018-0821
CVE-2018-0822
CVE-2018-0823
CVE-2018-0825
CVE-2018-0826
CVE-2018-0827
CVE-2018-0828
CVE-2018-0829
CVE-2018-0830
CVE-2018-0831
CVE-2018-0832
CVE-2018-0833
CVE-2018-0842
CVE-2018-0843
CVE-2018-0844
CVE-2018-0846
CVE-2018-0847
ADV180005
ACE
CVE-2018-07424.6Warning
CVE-2018-07564.6Warning
CVE-2018-07571.9Warning
CVE-2018-07602.1Warning
CVE-2018-08096.9High
CVE-2018-08101.9Warning
CVE-2018-08204.6Warning
CVE-2018-08214.4Warning
CVE-2018-08224.4Warning
CVE-2018-08234.4Warning
CVE-2018-08257.6Critical
CVE-2018-08264.4Warning
CVE-2018-08274.6Warning
CVE-2018-08284.6Warning
CVE-2018-08291.9Warning
CVE-2018-08301.9Warning
CVE-2018-08314.6Warning
CVE-2018-08321.9Warning
CVE-2018-08336.3High
CVE-2018-08426.9High
CVE-2018-08431.9Warning
CVE-2018-08444.6Warning
CVE-2018-08464.6Warning
CVE-2018-08474.3Warning
4074591
4074590
4074594
4074597
4074593
4074589
4074596
4074592
4074588
Public exploits exist for this vulnerability.
support.microsoft.com/kb/4074588
support.microsoft.com/kb/4074589
support.microsoft.com/kb/4074590
support.microsoft.com/kb/4074591
support.microsoft.com/kb/4074592
support.microsoft.com/kb/4074593
support.microsoft.com/kb/4074594
support.microsoft.com/kb/4074596
support.microsoft.com/kb/4074597
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0742
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0756
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0757
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0760
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0809
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0810
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0820
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0821
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0822
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0823
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0825
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0826
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0827
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0828
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0829
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0830
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0831
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0832
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0833
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0842
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0843
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0844
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0846
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0847
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-0742
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-0756
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-0757
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-0760
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-0809
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-0810
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-0820
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-0821
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-0822
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-0823
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-0825
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-0826
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-0827
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-0828
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-0829
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-0830
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-0831
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-0832
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-0833
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-0842
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-0843
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-0844
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-0846
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-0847
portal.msrc.microsoft.com/en-us/security-guidance
portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180005
statistics.securelist.com/vulnerability-scan/month
threats.kaspersky.com/en/class/Exploit/
threats.kaspersky.com/en/product/Microsoft-Windows-10/
threats.kaspersky.com/en/product/Microsoft-Windows-7/
threats.kaspersky.com/en/product/Microsoft-Windows-8/
threats.kaspersky.com/en/product/Microsoft-Windows-Server-2008/
threats.kaspersky.com/en/product/Microsoft-Windows-Server-2012/
threats.kaspersky.com/en/product/Microsoft-Windows-Server/
threats.kaspersky.com/en/product/Microsoft-Windows/
threats.kaspersky.com/en/product/Windows-RT/
7.8 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
7.6 High
CVSS2
Access Vector
NETWORK
Access Complexity
HIGH
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:H/Au:N/C:C/I:C/A:C
0.194 Low
EPSS
Percentile
96.2%