9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 High
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:C/I:C/A:C
0.954 High
EPSS
Percentile
99.3%
01/08/2019
Critical
Multiple serious vulnerabilities were found in Microsoft Windows. Malicious users can exploit these vulnerabilities to gain privileges, obtain sensitive information and execute arbitrary code.
Windows 10 for 32-bit Systems
Windows 10 Version 1809 for x64-based Systems
Windows Server 2016 (Server Core installation)
Windows 10 Version 1607 for 32-bit Systems
Windows 10 Version 1709 for ARM64-based Systems
Windows 10 Version 1803 for x64-based Systems
Windows Server 2019
Windows 10 Version 1809 for 32-bit Systems
Windows 10 for x64-based Systems
Windows 10 Version 1803 for 32-bit Systems
Windows Server, version 1709 (Server Core Installation)
Windows Server, version 1803 (Server Core Installation)
Windows 10 Version 1809 for ARM64-based Systems
Windows 10 Version 1703 for x64-based Systems
Windows 10 Version 1709 for 32-bit Systems
Windows 10 Version 1803 for ARM64-based Systems
Windows 10 Version 1709 for 64-based Systems
Windows Server 2019 (Server Core installation)
Windows Server 2016
Windows 10 Version 1607 for x64-based Systems
Windows 10 Version 1703 for 32-bit Systems
Windows 8.1 for x64-based systems
Windows Server 2012 R2 (Server Core installation)
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)
Windows 7 for 32-bit Systems Service Pack 1
Windows 7 for x64-based Systems Service Pack 1
Windows Server 2008 R2 for x64-based Systems Service Pack 1
Windows RT 8.1
Windows Server 2008 for Itanium-Based Systems Service Pack 2
Windows Server 2008 for x64-based Systems Service Pack 2
Windows 8.1 for 32-bit systems
Windows Server 2012
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation)
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation)
Windows Server 2012 R2
Windows Server 2008 R2 for Itanium-Based Systems Service Pack 1
Windows Server 2008 for 32-bit Systems Service Pack 2
Windows Server 2012 (Server Core installation)
Install necessary updates from the KB section, that are listed in your Windows Update (Windows Update usually can be accessed from the Control Panel)
CVE-2019-0572
CVE-2019-0549
CVE-2019-0570
CVE-2019-0583
CVE-2019-0555
CVE-2019-0543
CVE-2019-0580
CVE-2019-0571
CVE-2019-0547
CVE-2019-0574
CVE-2019-0550
CVE-2019-0569
CVE-2019-0551
CVE-2019-0553
CVE-2019-0573
CVE-2019-0577
CVE-2019-0554
CVE-2019-0581
CVE-2019-0582
CVE-2019-0579
CVE-2019-0536
CVE-2019-0578
CVE-2019-0584
CVE-2019-0552
CVE-2019-0538
CVE-2019-0576
CVE-2019-0575
ACE
CVE-2019-05726.8High
CVE-2019-05492.1Warning
CVE-2019-05704.6Warning
CVE-2019-05839.3Critical
CVE-2019-05554.4Warning
CVE-2019-05434.6Warning
CVE-2019-05809.3Critical
CVE-2019-05716.8High
CVE-2019-05477.5Critical
CVE-2019-05746.8High
CVE-2019-05507.7Critical
CVE-2019-05692.1Warning
CVE-2019-05517.7Critical
CVE-2019-05532.1Warning
CVE-2019-05736.8High
CVE-2019-05779.3Critical
CVE-2019-05542.1Warning
CVE-2019-05819.3Critical
CVE-2019-05829.3Critical
CVE-2019-05799.3Critical
CVE-2019-05362.1Warning
CVE-2019-05789.3Critical
CVE-2019-05849.3Critical
CVE-2019-05524.6Warning
CVE-2019-05389.3Critical
CVE-2019-05769.3Critical
CVE-2019-05759.3Critical
4480978
4480962
4480966
4480116
4480961
4480973
4480963
4480964
4480972
4480975
4487020
4487017
4486996
4487026
4487025
4487044
4487018
4487028
4487000
4486993
Public exploits exist for this vulnerability.
support.microsoft.com/kb/4480116
support.microsoft.com/kb/4480961
support.microsoft.com/kb/4480962
support.microsoft.com/kb/4480963
support.microsoft.com/kb/4480964
support.microsoft.com/kb/4480966
support.microsoft.com/kb/4480972
support.microsoft.com/kb/4480973
support.microsoft.com/kb/4480975
support.microsoft.com/kb/4480978
support.microsoft.com/kb/4486993
support.microsoft.com/kb/4486996
support.microsoft.com/kb/4487000
support.microsoft.com/kb/4487017
support.microsoft.com/kb/4487018
support.microsoft.com/kb/4487020
support.microsoft.com/kb/4487025
support.microsoft.com/kb/4487026
support.microsoft.com/kb/4487028
support.microsoft.com/kb/4487044
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0536
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0538
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0543
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0547
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0549
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0550
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0551
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0552
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0553
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0554
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0555
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0569
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0570
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0571
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0572
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0573
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0574
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0575
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0576
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0577
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0578
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0579
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0580
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0581
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0582
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0583
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0584
portal.msrc.microsoft.com/en-us/security-guidance
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0536
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0538
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0543
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0547
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0549
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0550
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0551
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0552
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0553
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0554
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0555
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0569
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0570
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0571
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0572
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0573
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0574
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0575
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0576
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0577
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0578
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0579
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0580
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0581
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0582
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0583
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0584
statistics.securelist.com/vulnerability-scan/month
threats.kaspersky.com/en/class/Exploit/
threats.kaspersky.com/en/product/Microsoft-Windows/
9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 High
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:C/I:C/A:C
0.954 High
EPSS
Percentile
99.3%