9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 High
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:C/I:C/A:C
0.953 High
EPSS
Percentile
99.3%
4489881
4489891
4489883
4489886
4489899
4489871
4489868
4489872
4489884
4489882
4493441
4493464
4507464
4507460
4507457
4507448
4507453
4507469
4507435
4507462
4507455
4507458
4507450
03/12/2019
Critical
Multiple vulnerabilities were found in Microsoft Windows. Malicious users can exploit these vulnerabilities to obtain sensitive information, gain privileges, execute arbitrary code, cause denial of service.
Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.
Windows 10 Version 1607 for x64-based Systems
Windows 10 Version 1809 for ARM64-based Systems
Windows 10 Version 1703 for x64-based Systems
Windows Server 2012 R2
Windows Server 2016
Windows RT 8.1
Windows 7 for 32-bit Systems Service Pack 1
Windows 10 Version 1803 for 32-bit Systems
Windows 8.1 for 32-bit systems
Windows 10 Version 1809 for x64-based Systems
Windows 10 Version 1709 for 32-bit Systems
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation)
Windows 10 Version 1607 for 32-bit Systems
Windows Server 2008 R2 for x64-based Systems Service Pack 1
Windows 10 Version 1803 for x64-based Systems
Windows 10 Version 1703 for 32-bit Systems
Windows 10 for x64-based Systems
Windows 10 for 32-bit Systems
Windows Server 2008 for Itanium-Based Systems Service Pack 2
Windows 10 Version 1709 for ARM64-based Systems
Windows 10 Version 1809 for 32-bit Systems
Windows Server 2008 for x64-based Systems Service Pack 2
Windows Server 2008 R2 for Itanium-Based Systems Service Pack 1
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)
Windows Server 2012
Windows 8.1 for x64-based systems
Windows 7 for x64-based Systems Service Pack 1
Windows 10 Version 1803 for ARM64-based Systems
Windows Server 2012 R2 (Server Core installation)
Windows Server 2008 for 32-bit Systems Service Pack 2
Windows Server 2019
Windows Server 2012 (Server Core installation)
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation)
Windows Server 2019 (Server Core installation)
Windows 10 Version 1709 for x64-based Systems
Windows Server 2016 (Server Core installation)
Windows Server, version 1903 (Server Core installation)
Windows 10 Version 1903 for x64-based Systems
Windows 10 Version 1903 for 32-bit Systems
Windows Server, version 1803 (Server Core Installation)
Windows 10 Version 1903 for ARM64-based Systems
Install necessary updates from the KB section, that are listed in your Windows Update (Windows Update usually can be accessed from the Control Panel)
CVE-2019-0782
CVE-2019-0694
CVE-2019-0797
CVE-2019-0766
CVE-2019-0772
CVE-2019-0704
CVE-2019-0776
CVE-2019-0759
CVE-2019-0765
CVE-2019-0754
CVE-2019-0775
CVE-2019-0756
CVE-2019-0603
CVE-2019-0755
CVE-2019-0726
CVE-2019-0683
CVE-2019-0696
CVE-2019-0701
CVE-2019-0692
CVE-2019-0614
CVE-2019-0703
CVE-2019-0821
CVE-2019-0695
CVE-2019-0702
CVE-2019-0689
CVE-2019-0690
CVE-2019-0617
CVE-2019-0693
CVE-2019-0697
CVE-2019-0784
CVE-2019-0767
CVE-2019-0682
CVE-2019-0698
CVE-2019-0774
ADV190010
ACE
CVE-2019-07822.1Warning
CVE-2019-06944.6Warning
CVE-2019-07977.2High
CVE-2019-07667.2High
CVE-2019-07729.3Critical
CVE-2019-07044.0Warning
CVE-2019-07762.1Warning
CVE-2019-07592.1Warning
CVE-2019-07659.3Critical
CVE-2019-07544.9Warning
CVE-2019-07751.9Warning
CVE-2019-07569.3Critical
CVE-2019-06038.5Critical
CVE-2019-07552.1Warning
CVE-2019-07267.5Critical
CVE-2019-06834.3Warning
CVE-2019-06967.2High
CVE-2019-07015.5High
CVE-2019-06924.6Warning
CVE-2019-06144.3Warning
CVE-2019-07034.0Warning
CVE-2019-08214.0Warning
CVE-2019-06955.5High
CVE-2019-07022.1Warning
CVE-2019-06894.6Warning
CVE-2019-06905.5High
CVE-2019-06179.3Critical
CVE-2019-06934.6Warning
CVE-2019-06977.5Critical
CVE-2019-07847.6Critical
CVE-2019-07672.1Warning
CVE-2019-06824.6Warning
CVE-2019-06987.5Critical
CVE-2019-07744.3Warning
support.microsoft.com/kb/4489868
support.microsoft.com/kb/4489871
support.microsoft.com/kb/4489872
support.microsoft.com/kb/4489881
support.microsoft.com/kb/4489882
support.microsoft.com/kb/4489883
support.microsoft.com/kb/4489884
support.microsoft.com/kb/4489886
support.microsoft.com/kb/4489891
support.microsoft.com/kb/4489899
support.microsoft.com/kb/4493441
support.microsoft.com/kb/4493464
support.microsoft.com/kb/4507435
support.microsoft.com/kb/4507448
support.microsoft.com/kb/4507450
support.microsoft.com/kb/4507453
support.microsoft.com/kb/4507455
support.microsoft.com/kb/4507457
support.microsoft.com/kb/4507458
support.microsoft.com/kb/4507460
support.microsoft.com/kb/4507462
support.microsoft.com/kb/4507464
support.microsoft.com/kb/4507469
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0603
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0614
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0617
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0682
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0683
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0689
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0690
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0692
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0693
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0694
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0695
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0696
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0697
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0698
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0701
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0702
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0703
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0704
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0726
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0754
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0755
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0756
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0759
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0765
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0766
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0767
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0772
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0774
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0775
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0776
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0782
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0784
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0797
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0821
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-0603
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-0614
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-0617
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-0682
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-0683
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-0689
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-0690
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-0692
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-0693
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-0694
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-0695
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-0696
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-0697
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-0698
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-0701
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-0702
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-0703
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-0704
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-0726
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-0754
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-0755
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-0756
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-0759
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-0765
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-0766
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-0767
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-0772
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-0774
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-0775
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-0776
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-0782
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-0784
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-0797
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-0821
portal.msrc.microsoft.com/en-us/security-guidance
portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV190010
statistics.securelist.com/vulnerability-scan/month
threats.kaspersky.com/en/class/Exploit/
threats.kaspersky.com/en/product/Microsoft-Windows-10/
threats.kaspersky.com/en/product/Microsoft-Windows-7/
threats.kaspersky.com/en/product/Microsoft-Windows-8/
threats.kaspersky.com/en/product/Microsoft-Windows-Server-2008/
threats.kaspersky.com/en/product/Microsoft-Windows-Server-2012/
threats.kaspersky.com/en/product/Microsoft-Windows-Server/
threats.kaspersky.com/en/product/Microsoft-Windows/
threats.kaspersky.com/en/product/Windows-RT/
9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 High
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:C/I:C/A:C
0.953 High
EPSS
Percentile
99.3%