9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
8.7 High
AI Score
Confidence
High
10 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:C/I:C/A:C
0.939 High
EPSS
Percentile
99.1%
07/11/2017
Critical
Multiple vulnerabilities were found in Microsoft Products (Extended Support Update). Malicious users can exploit these vulnerabilities to obtain sensitive information, execute arbitrary code, gain privileges, bypass security restrictions, cause denial of service.
Public exploits exist for this vulnerability.
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation)
Windows 10 for 32-bit Systems
Internet Explorer 9
Windows 10 for x64-based Systems
Windows Server 2012 (Server Core installation)
Windows Server 2016 (Server Core installation)
Windows 7 for x64-based Systems Service Pack 1
Windows 8.1 for 32-bit systems
Windows Server 2008 for 32-bit Systems Service Pack 2
Windows 8.1 for x64-based systems
Windows Server 2012
Internet Explorer 11
Windows Server 2008 for x64-based Systems Service Pack 2
Windows Server 2016
Windows RT 8.1
Windows Server 2008 for Itanium-Based Systems Service Pack 2
Windows 10 Version 1703 for x64-based Systems
Windows Server 2012 R2 (Server Core installation)
Windows Server 2008 R2 for Itanium-Based Systems Service Pack 1
Windows 10 Version 1511 for 32-bit Systems
Microsoft Edge (EdgeHTML-based)
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation)
Windows 10 Version 1511 for x64-based Systems
Windows 10 Version 1607 for 32-bit Systems
Windows 10 Version 1607 for x64-based Systems
Windows 7 for 32-bit Systems Service Pack 1
Windows Server 2008 R2 for x64-based Systems Service Pack 1
Internet Explorer 10
Windows 10 Version 1703 for 32-bit Systems
Windows Server 2012 R2
Install necessary updates from the KB section, that are listed in your Windows Update (Windows Update usually can be accessed from the Control Panel)
CVE-2017-8486
CVE-2017-8608
CVE-2017-8467
CVE-2017-8606
CVE-2017-8463
CVE-2017-8563
CVE-2017-8590
CVE-2017-8564
CVE-2017-8565
CVE-2017-8607
CVE-2017-8618
CVE-2017-8592
CVE-2017-8495
CVE-2017-8557
CVE-2017-8556
CVE-2017-8573
CVE-2017-8577
CVE-2017-8578
CVE-2017-0170
CVE-2017-8588
CVE-2017-8589
CVE-2017-8587
CVE-2017-8580
CVE-2017-8581
CVE-2017-8582
ACE
CVE-2017-01706.5High
CVE-2017-84637.8Critical
CVE-2017-84677.0High
CVE-2017-84864.7Warning
CVE-2017-84957.5Critical
CVE-2017-85567.0High
CVE-2017-85575.5High
CVE-2017-85638.1Critical
CVE-2017-85645.5High
CVE-2017-85658.1Critical
CVE-2017-85737.0High
CVE-2017-85777.0High
CVE-2017-85787.8Critical
CVE-2017-85807.0High
CVE-2017-85817.0High
CVE-2017-85825.9High
CVE-2017-85876.5High
CVE-2017-85887.0High
CVE-2017-85899.8Critical
CVE-2017-85908.8Critical
CVE-2017-85926.5High
CVE-2017-86067.5Critical
CVE-2017-86077.5Critical
CVE-2017-86087.5Critical
CVE-2017-86187.5Critical
4022746
4022748
4022914
4025337
4025341
4025397
4025398
4025409
4025497
4025674
4025872
4025877
4026059
4026061
4032955
4025240
4025252
support.microsoft.com/kb/4022746
support.microsoft.com/kb/4022748
support.microsoft.com/kb/4022914
support.microsoft.com/kb/4025240
support.microsoft.com/kb/4025252
support.microsoft.com/kb/4025337
support.microsoft.com/kb/4025341
support.microsoft.com/kb/4025397
support.microsoft.com/kb/4025398
support.microsoft.com/kb/4025409
support.microsoft.com/kb/4025497
support.microsoft.com/kb/4025674
support.microsoft.com/kb/4025872
support.microsoft.com/kb/4025877
support.microsoft.com/kb/4026059
support.microsoft.com/kb/4026061
support.microsoft.com/kb/4032955
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0170
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8463
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8467
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8486
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8495
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8556
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8557
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8563
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8564
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8565
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8573
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8577
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8578
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8580
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8581
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8582
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8587
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8588
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8589
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8590
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8592
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8606
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8607
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8608
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8618
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2017-0170
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2017-8463
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2017-8467
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2017-8486
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2017-8495
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2017-8556
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2017-8557
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2017-8563
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2017-8564
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2017-8565
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2017-8573
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2017-8577
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2017-8578
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2017-8580
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2017-8581
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2017-8582
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2017-8587
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2017-8588
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2017-8589
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2017-8590
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2017-8592
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2017-8606
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2017-8607
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2017-8608
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2017-8618
portal.msrc.microsoft.com/en-us/security-guidance
statistics.securelist.com/vulnerability-scan/month
threats.kaspersky.com/en/class/Exploit/
threats.kaspersky.com/en/product/Microsoft-Edge/
threats.kaspersky.com/en/product/Microsoft-Internet-Explorer/
threats.kaspersky.com/en/product/Microsoft-Windows-10/
threats.kaspersky.com/en/product/Microsoft-Windows-7/
threats.kaspersky.com/en/product/Microsoft-Windows-8/
threats.kaspersky.com/en/product/Microsoft-Windows-Server-2008/
threats.kaspersky.com/en/product/Microsoft-Windows-Server-2012/
threats.kaspersky.com/en/product/Microsoft-Windows-Server/
threats.kaspersky.com/en/product/Microsoft-Windows/
threats.kaspersky.com/en/product/Windows-RT/
9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
8.7 High
AI Score
Confidence
High
10 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:C/I:C/A:C
0.939 High
EPSS
Percentile
99.1%