8.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
9.3 High
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:C/I:C/A:C
0.275 Low
EPSS
Percentile
96.7%
03/12/2019
Critical
Multiple vulnerabilities were found in Microsoft Products (Extended Support Update). Malicious users can exploit these vulnerabilities to cause denial of service, execute arbitrary code, obtain sensitive information, gain privileges.
Public exploits exist for this vulnerability.
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation)
Windows 10 for 32-bit Systems
Windows Server, version 1803 (Server Core Installation)
Windows 10 Version 1903 for x64-based Systems
Internet Explorer 9
Windows 10 for x64-based Systems
Windows Server 2012 (Server Core installation)
Windows Server 2016 (Server Core installation)
Windows 7 for x64-based Systems Service Pack 1
Windows 8.1 for 32-bit systems
Windows 8.1 for x64-based systems
Windows Server 2008 for 32-bit Systems Service Pack 2
Windows Server 2012
ChakraCore
Internet Explorer 11
Windows 10 Version 1803 for ARM64-based Systems
Windows Server 2008 for x64-based Systems Service Pack 2
Windows Server 2016
Windows 10 Version 1709 for x64-based Systems
Windows RT 8.1
Windows 10 Version 1709 for ARM64-based Systems
Windows 10 Version 1703 for x64-based Systems
Windows 10 Version 1809 for 32-bit Systems
Windows Server 2008 for Itanium-Based Systems Service Pack 2
Windows 10 Version 1809 for ARM64-based Systems
Windows 10 Version 1903 for 32-bit Systems
Windows Server 2012 R2 (Server Core installation)
Windows Server 2008 R2 for Itanium-Based Systems Service Pack 1
Windows Server 2019 (Server Core installation)
Microsoft Edge (EdgeHTML-based)
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)
Windows 10 Version 1803 for x64-based Systems
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation)
Windows Server, version 1903 (Server Core installation)
Windows 10 Version 1903 for ARM64-based Systems
Windows 10 Version 1607 for 32-bit Systems
Windows 10 Version 1809 for x64-based Systems
Windows 10 Version 1607 for x64-based Systems
Windows 10 Version 1803 for 32-bit Systems
Windows 7 for 32-bit Systems Service Pack 1
Windows 10 Version 1709 for 32-bit Systems
Windows Server 2008 R2 for x64-based Systems Service Pack 1
Windows 10 Version 1703 for 32-bit Systems
Internet Explorer 10
Windows Server 2012 R2
Windows Server 2019
Install necessary updates from the KB section, that are listed in your Windows Update (Windows Update usually can be accessed from the Control Panel)
CVE-2019-0754
CVE-2019-0617
CVE-2019-0614
CVE-2019-0775
CVE-2019-0774
CVE-2019-0756
CVE-2019-0755
CVE-2019-0772
CVE-2019-0759
CVE-2019-0690
CVE-2019-0603
CVE-2019-0702
CVE-2019-0703
CVE-2019-0704
CVE-2019-0746
CVE-2019-0767
CVE-2019-0765
CVE-2019-0667
CVE-2019-0666
CVE-2019-0782
CVE-2019-0784
CVE-2019-0683
CVE-2019-0821
CVE-2019-0808
ADV190009
ACE
CVE-2019-06677.6Critical
CVE-2019-07464.3Warning
CVE-2019-06667.6Critical
CVE-2019-07822.1Warning
CVE-2019-08087.2High
CVE-2019-07729.3Critical
CVE-2019-07044.0Warning
CVE-2019-07592.1Warning
CVE-2019-07659.3Critical
CVE-2019-07544.9Warning
CVE-2019-07751.9Warning
CVE-2019-07569.3Critical
CVE-2019-06038.5Critical
CVE-2019-07552.1Warning
CVE-2019-06834.3Warning
CVE-2019-06144.3Warning
CVE-2019-07034.0Warning
CVE-2019-08214.0Warning
CVE-2019-07022.1Warning
CVE-2019-06905.5High
CVE-2019-06179.3Critical
CVE-2019-07847.6Critical
CVE-2019-07672.1Warning
CVE-2019-07744.3Warning
4489878
4489885
4489880
4489876
4489873
4474419
4507456
4507449
4507452
4507461
support.microsoft.com/kb/4474419
support.microsoft.com/kb/4489873
support.microsoft.com/kb/4489876
support.microsoft.com/kb/4489878
support.microsoft.com/kb/4489880
support.microsoft.com/kb/4489885
support.microsoft.com/kb/4507449
support.microsoft.com/kb/4507452
support.microsoft.com/kb/4507456
support.microsoft.com/kb/4507461
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0603
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0614
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0617
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0666
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0667
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0683
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0690
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0702
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0703
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0704
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0746
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0754
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0755
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0756
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0759
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0765
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0767
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0772
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0774
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0775
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0782
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0784
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0808
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0821
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-0603
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-0614
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-0617
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-0666
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-0667
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-0683
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-0690
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-0702
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-0703
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-0704
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-0746
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-0754
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-0755
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-0756
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-0759
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-0765
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-0767
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-0772
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-0774
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-0775
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-0782
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-0784
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-0808
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-0821
portal.msrc.microsoft.com/en-us/security-guidance
portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV190009
statistics.securelist.com/vulnerability-scan/month
threats.kaspersky.com/en/class/Exploit/
threats.kaspersky.com/en/product/ChakraCore/
threats.kaspersky.com/en/product/Microsoft-Edge/
threats.kaspersky.com/en/product/Microsoft-Internet-Explorer/
threats.kaspersky.com/en/product/Microsoft-Windows-10/
threats.kaspersky.com/en/product/Microsoft-Windows-7/
threats.kaspersky.com/en/product/Microsoft-Windows-8/
threats.kaspersky.com/en/product/Microsoft-Windows-Server-2008/
threats.kaspersky.com/en/product/Microsoft-Windows-Server-2012/
threats.kaspersky.com/en/product/Microsoft-Windows-Server/
threats.kaspersky.com/en/product/Microsoft-Windows/
threats.kaspersky.com/en/product/Windows-RT/
8.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
9.3 High
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:C/I:C/A:C
0.275 Low
EPSS
Percentile
96.7%