Lucene search

K
kasperskyKaspersky LabKLA11221
HistoryApr 10, 2018 - 12:00 a.m.

KLA11221 Multiple vulnerabilities in Microsoft Windows

2018-04-1000:00:00
Kaspersky Lab
threats.kaspersky.com
182

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

8.5 High

AI Score

Confidence

Low

9.3 High

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

0.652 Medium

EPSS

Percentile

97.8%

Detect date:

04/10/2018

Severity:

Critical

Description:

Multiple serious vulnerabilities have been found in Microsoft Windows . Malicious users can exploit these vulnerabilities to execute arbitrary code, gain privileges, obtain sensitive information, cause denial of service and possibly to bypass security restrictions.

Affected products:

Windows 10 Version 1511 for 32-bit Systems
Windows 10 Version 1511 for x64-based Systems
Windows 10 Version 1607 for 32-bit Systems
Windows 10 Version 1607 for x64-based Systems
Windows 10 Version 1703 for 32-bit Systems
Windows 10 Version 1703 for x64-based Systems
Windows 10 Version 1709 for 32-bit Systems
Windows 10 Version 1709 for 64-based Systems
Windows 10 for 32-bit Systems
Windows 10 for x64-based Systems
Windows 7 for 32-bit Systems Service Pack 1
Windows 7 for x64-based Systems Service Pack 1
Windows 8.1 for 32-bit systems
Windows 8.1 for x64-based systems
Windows Defender
Windows Intune Endpoint Protection
Windows RT 8.1
Windows Server 2008 R2 for Itanium-Based Systems Service Pack 1
Windows Server 2008 R2 for x64-based Systems Service Pack 1
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)
Windows Server 2008 for 32-bit Systems Service Pack 2
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation)
Windows Server 2008 for Itanium-Based Systems Service Pack 2
Windows Server 2008 for x64-based Systems Service Pack 2
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation)
Windows Server 2012
Windows Server 2012 (Server Core installation)
Windows Server 2012 R2
Windows Server 2012 R2 (Server Core installation)
Windows Server 2016
Windows Server 2016 (Server Core installation)
Windows Server, version 1709 (Server Core Installation)

Solution:

Install necessary updates from the KB section, that are listed in your Windows Update (Windows Update usually can be accessed from the Control Panel)

Original advisories:

CVE-2018-0887
CVE-2018-0890
CVE-2018-0956
CVE-2018-0957
CVE-2018-0960
CVE-2018-0963
CVE-2018-0964
CVE-2018-0966
CVE-2018-0967
CVE-2018-0968
CVE-2018-0969
CVE-2018-0970
CVE-2018-0971
CVE-2018-0972
CVE-2018-0973
CVE-2018-0974
CVE-2018-0975
CVE-2018-0976
CVE-2018-1003
CVE-2018-1004
CVE-2018-1008
CVE-2018-1009
CVE-2018-1010
CVE-2018-1012
CVE-2018-1013
CVE-2018-1015
CVE-2018-1016
CVE-2018-8116

Impacts:

ACE

Related products:

Microsoft Windows

CVE-IDS:

CVE-2018-08875.5High
CVE-2018-08905.3High
CVE-2018-09567.5Critical
CVE-2018-09575.3High
CVE-2018-09605.5High
CVE-2018-09637.8Critical
CVE-2018-09646.1High
CVE-2018-09663.3Warning
CVE-2018-09675.3High
CVE-2018-09685.5High
CVE-2018-09695.5High
CVE-2018-09705.5High
CVE-2018-09715.5High
CVE-2018-09725.5High
CVE-2018-09735.5High
CVE-2018-09745.5High
CVE-2018-09755.5High
CVE-2018-09765.3High
CVE-2018-10037.8Critical
CVE-2018-10048.8Critical
CVE-2018-10087.0High
CVE-2018-10097.8Critical
CVE-2018-10108.8Critical
CVE-2018-10128.8Critical
CVE-2018-10138.8Critical
CVE-2018-10158.8Critical
CVE-2018-10168.8Critical
CVE-2018-81165.5High

Microsoft official advisories:

KB list:

4093112
4103727
4093114
4093111
4093107
4093109
4093119
4093115
4093122
4093123
4284835

Exploitation:

Public exploits exist for this vulnerability.

References

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

8.5 High

AI Score

Confidence

Low

9.3 High

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

0.652 Medium

EPSS

Percentile

97.8%