8.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
8.8 High
AI Score
Confidence
Low
9.3 High
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:C/I:C/A:C
0.971 High
EPSS
Percentile
99.8%
09/11/2018
Critical
Multiple vulnerabilities were found in Microsoft Windows. Malicious users can exploit these vulnerabilities to obtain sensitive information, gain privileges, cause denial of service, execute arbitrary code, bypass security restrictions.
Windows 10 Version 1607 for 32-bit Systems
Windows 10 Version 1607 for x64-based Systems
Windows 10 Version 1703 for 32-bit Systems
Windows 10 Version 1703 for x64-based Systems
Windows 10 Version 1709 for 32-bit Systems
Windows 10 Version 1803 for 32-bit Systems
Windows 10 Version 1803 for x64-based Systems
Windows 10 for 32-bit Systems
Windows 10 for x64-based Systems
Windows 7 for 32-bit Systems Service Pack 1
Windows 7 for x64-based Systems Service Pack 1
Windows 8.1 for 32-bit systems
Windows 8.1 for x64-based systems
Windows RT 8.1
Windows Server 2008 R2 for Itanium-Based Systems Service Pack 1
Windows Server 2008 R2 for x64-based Systems Service Pack 1
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)
Windows Server 2008 for 32-bit Systems Service Pack 2
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation)
Windows Server 2008 for Itanium-Based Systems Service Pack 2
Windows Server 2008 for x64-based Systems Service Pack 2
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation)
Windows Server 2012
Windows Server 2012 (Server Core installation)
Windows Server 2012 R2
Windows Server 2012 R2 (Server Core installation)
Windows Server 2016
Windows Server 2016 (Server Core installation)
Windows Server, version 1803 (Server Core Installation)
Windows 10 Version 1709 for x64-based Systems
Install necessary updates from the KB section, that are listed in your Windows Update (Windows Update usually can be accessed from the Control Panel)
CVE-2018-8433
CVE-2018-8462
CVE-2018-8442
CVE-2018-8440
CVE-2018-8438
CVE-2018-8455
CVE-2018-8392
CVE-2018-8410
CVE-2018-8335
CVE-2018-8444
CVE-2018-8441
CVE-2018-8332
CVE-2018-0965
CVE-2018-8271
CVE-2018-8437
CVE-2018-8443
CVE-2018-8475
CVE-2018-8419
CVE-2018-8434
CVE-2018-8420
CVE-2018-8436
CVE-2018-8439
CVE-2018-8449
CVE-2018-8435
CVE-2018-8424
CVE-2018-8468
CVE-2018-8393
CVE-2018-8445
CVE-2018-8337
CVE-2018-8446
ADV180022
ACE
CVE-2018-84334.7Warning
CVE-2018-84627.8Critical
CVE-2018-84425.5High
CVE-2018-84407.8Critical
CVE-2018-84386.8High
CVE-2018-84557.8Critical
CVE-2018-83927.8Critical
CVE-2018-84107.8Critical
CVE-2018-83357.5Critical
CVE-2018-84445.9High
CVE-2018-84417.8Critical
CVE-2018-83328.8Critical
CVE-2018-09658.4Critical
CVE-2018-82715.5High
CVE-2018-84376.2High
CVE-2018-84435.5High
CVE-2018-84758.8Critical
CVE-2018-84195.5High
CVE-2018-84345.4High
CVE-2018-84208.8Critical
CVE-2018-84366.2High
CVE-2018-84398.4Critical
CVE-2018-84493.3Warning
CVE-2018-84354.2Warning
CVE-2018-84246.5High
CVE-2018-84684.7Warning
CVE-2018-83937.8Critical
CVE-2018-84455.5High
CVE-2018-83375.3High
CVE-2018-84465.5High
4457128
4457131
4457132
4457142
4457138
4457129
4457143
4457135
4457140
4598275
4598243
4598285
Public exploits exist for this vulnerability.
support.microsoft.com/kb/4457128
support.microsoft.com/kb/4457129
support.microsoft.com/kb/4457131
support.microsoft.com/kb/4457132
support.microsoft.com/kb/4457135
support.microsoft.com/kb/4457138
support.microsoft.com/kb/4457140
support.microsoft.com/kb/4457142
support.microsoft.com/kb/4457143
support.microsoft.com/kb/4598243
support.microsoft.com/kb/4598275
support.microsoft.com/kb/4598285
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0965
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8271
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8332
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8335
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8337
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8392
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8393
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8410
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8419
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8420
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8424
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8433
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8434
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8435
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8436
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8437
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8438
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8439
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8440
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8441
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8442
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8443
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8444
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8445
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8446
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8449
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8455
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8462
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8468
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8475
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-0965
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-8271
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-8332
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-8335
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-8337
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-8392
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-8393
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-8410
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-8419
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-8420
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-8424
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-8433
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-8434
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-8435
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-8436
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-8437
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-8438
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-8439
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-8440
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-8441
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-8442
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-8443
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-8444
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-8445
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-8446
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-8449
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-8455
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-8462
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-8468
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-8475
portal.msrc.microsoft.com/en-us/security-guidance
portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180022
statistics.securelist.com/vulnerability-scan/month
threats.kaspersky.com/en/class/Exploit/
threats.kaspersky.com/en/product/Microsoft-Windows-10/
threats.kaspersky.com/en/product/Microsoft-Windows-7/
threats.kaspersky.com/en/product/Microsoft-Windows-8/
threats.kaspersky.com/en/product/Microsoft-Windows-Server-2008/
threats.kaspersky.com/en/product/Microsoft-Windows-Server-2012/
threats.kaspersky.com/en/product/Microsoft-Windows-Server/
threats.kaspersky.com/en/product/Microsoft-Windows/
threats.kaspersky.com/en/product/Windows-RT/
8.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
8.8 High
AI Score
Confidence
Low
9.3 High
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:C/I:C/A:C
0.971 High
EPSS
Percentile
99.8%