8.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
8.6 High
AI Score
Confidence
High
9.3 High
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:C/I:C/A:C
0.898 High
EPSS
Percentile
98.7%
08/14/2018
Critical
Multiple vulnerabilities were found in Microsoft Windows. Malicious users can exploit these vulnerabilities to gain privileges, execute arbitrary code, bypass security restrictions, obtain sensitive information.
Windows 10 Version 1607 for 32-bit Systems
Windows 10 Version 1607 for x64-based Systems
Windows 10 Version 1703 for 32-bit Systems
Windows 10 Version 1703 for x64-based Systems
Windows 10 Version 1709 for 32-bit Systems
Windows 10 Version 1803 for 32-bit Systems
Windows 10 Version 1803 for x64-based Systems
Windows 10 for 32-bit Systems
Windows 10 for x64-based Systems
Windows 7 for 32-bit Systems Service Pack 1
Windows 7 for x64-based Systems Service Pack 1
Windows 8.1 for 32-bit systems
Windows 8.1 for x64-based systems
Windows RT 8.1
Windows Server 2008 R2 for Itanium-Based Systems Service Pack 1
Windows Server 2008 R2 for x64-based Systems Service Pack 1
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)
Windows Server 2008 for 32-bit Systems Service Pack 2
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation)
Windows Server 2008 for Itanium-Based Systems Service Pack 2
Windows Server 2008 for x64-based Systems Service Pack 2
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation)
Windows Server 2012
Windows Server 2012 (Server Core installation)
Windows Server 2012 R2
Windows Server 2012 R2 (Server Core installation)
Windows Server 2016
Microsoft Visual Studio 2017
Windows 10 Version 1709 for x64-based Systems
Windows Server, version 1803 (Server Core Installation)
Windows Server 2016 (Server Core installation)
Windows Server, version 1709 (Server Core Installation)
Microsoft Visual Studio 2015 Update 3
Microsoft Visual Studio 2017 version 15.8
Install necessary updates from the KB section, that are listed in your Windows Update (Windows Update usually can be accessed from the Control Panel)
CVE-2018-8343
CVE-2018-8399
CVE-2018-8401
CVE-2018-8200
CVE-2018-0952
CVE-2018-8400
CVE-2018-8398
CVE-2018-8404
CVE-2018-8344
CVE-2018-8348
CVE-2018-8339
CVE-2018-8394
CVE-2018-8345
CVE-2018-8253
CVE-2018-8341
CVE-2018-8349
CVE-2018-8350
CVE-2018-8340
CVE-2018-8204
CVE-2018-8414
CVE-2018-8347
CVE-2018-8405
CVE-2018-8406
ADV180018
ACE
CVE-2018-09527.8Critical
CVE-2018-84057.8Critical
CVE-2018-84148.8Critical
CVE-2018-83457.5Critical
CVE-2018-83498.8Critical
CVE-2018-84017.8Critical
CVE-2018-83406.5High
CVE-2018-83986.5High
CVE-2018-82045.3High
CVE-2018-84067.8Critical
CVE-2018-83484.7Warning
CVE-2018-83477.8Critical
CVE-2018-83397.0High
CVE-2018-83437.8Critical
CVE-2018-84007.8Critical
CVE-2018-83946.5High
CVE-2018-83508.8Critical
CVE-2018-84047.0High
CVE-2018-83997.0High
CVE-2018-82534.6Warning
CVE-2018-83414.7Warning
CVE-2018-82005.3High
CVE-2018-83448.8Critical
4343909
4343885
4343887
4343892
4343897
4343898
4343901
4343888
4343896
Public exploits exist for this vulnerability.
support.microsoft.com/kb/4343885
support.microsoft.com/kb/4343887
support.microsoft.com/kb/4343888
support.microsoft.com/kb/4343892
support.microsoft.com/kb/4343896
support.microsoft.com/kb/4343897
support.microsoft.com/kb/4343898
support.microsoft.com/kb/4343901
support.microsoft.com/kb/4343909
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0952
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8200
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8204
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8253
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8339
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8340
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8341
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8343
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8344
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8345
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8347
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8348
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8349
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8350
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8394
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8398
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8399
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8400
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8401
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8404
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8405
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8406
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8414
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/ADV180018
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-0952
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-8200
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-8204
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-8253
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-8339
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-8340
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-8341
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-8343
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-8344
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-8345
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-8347
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-8348
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-8349
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-8350
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-8394
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-8398
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-8399
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-8400
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-8401
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-8404
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-8405
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-8406
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-8414
portal.msrc.microsoft.com/en-us/security-guidance
statistics.securelist.com/vulnerability-scan/month
threats.kaspersky.com/en/class/Exploit/
threats.kaspersky.com/en/product/Microsoft-Visual-Studio/
threats.kaspersky.com/en/product/Microsoft-Windows-10/
threats.kaspersky.com/en/product/Microsoft-Windows-7/
threats.kaspersky.com/en/product/Microsoft-Windows-8/
threats.kaspersky.com/en/product/Microsoft-Windows-Server-2008/
threats.kaspersky.com/en/product/Microsoft-Windows-Server-2012/
threats.kaspersky.com/en/product/Microsoft-Windows-Server/
threats.kaspersky.com/en/product/Microsoft-Windows/
threats.kaspersky.com/en/product/Windows-RT/
8.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
8.6 High
AI Score
Confidence
High
9.3 High
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:C/I:C/A:C
0.898 High
EPSS
Percentile
98.7%