9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9 High
AI Score
Confidence
High
7.5 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
0.386 Low
EPSS
Percentile
97.2%
02/09/2021
Critical
Multiple vulnerabilities were found in Microsoft Windows. Malicious users can exploit these vulnerabilities to cause denial of service, gain privileges, execute arbitrary code, obtain sensitive information, bypass security restrictions.
Public exploits exist for this vulnerability.
Windows 10 Version 1909 for ARM64-based Systems
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation)
Windows Server 2012
Windows 10 Version 1809 for x64-based Systems
Windows Server 2008 for x64-based Systems Service Pack 2
Windows 10 Version 20H2 for ARM64-based Systems
Windows Server, version 2004 (Server Core installation)
Windows 10 Version 1607 for 32-bit Systems
Windows 10 Version 1803 for 32-bit Systems
Windows Server 2008 for 32-bit Systems Service Pack 2
Windows Server 2008 R2 for x64-based Systems Service Pack 1
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation)
Windows 10 Version 1909 for 32-bit Systems
Windows Server, version 20H2 (Server Core Installation)
Windows 10 Version 1803 for x64-based Systems
Windows 10 Version 2004 for 32-bit Systems
Windows 10 Version 2004 for ARM64-based Systems
Windows 7 for x64-based Systems Service Pack 1
Windows Server 2019
Windows RT 8.1
Windows 10 Version 2004 for x64-based Systems
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)
Windows Server, version 1909 (Server Core installation)
Windows Server 2016
Windows 10 Version 1809 for 32-bit Systems
Windows 8.1 for x64-based systems
Windows Server 2012 R2 (Server Core installation)
Windows 10 Version 1809 for ARM64-based Systems
Windows 10 Version 1803 for ARM64-based Systems
Windows Server 2016 (Server Core installation)
Windows Server 2012 R2
Windows 10 Version 1607 for x64-based Systems
Windows 7 for 32-bit Systems Service Pack 1
Windows 10 Version 20H2 for 32-bit Systems
Windows 10 for 32-bit Systems
Windows 10 Version 20H2 for x64-based Systems
Windows Server 2012 (Server Core installation)
Windows 10 for x64-based Systems
Windows Server 2019 (Server Core installation)
Windows 8.1 for 32-bit systems
Windows 10 Version 1909 for x64-based Systems
Windows Server, version 1903 (Server Core installation)
Windows 10 Version 1903 for ARM64-based Systems
Windows 10 Version 1903 for 32-bit Systems
Windows 10 Version 1903 for x64-based Systems
Install necessary updates from the KB section, that are listed in your Windows Update (Windows Update usually can be accessed from the Control Panel)
CVE-2021-24080
CVE-2021-24103
CVE-2021-24093
CVE-2021-1734
CVE-2021-25195
CVE-2021-24086
CVE-2021-1727
CVE-2021-24102
CVE-2021-24094
CVE-2021-24076
CVE-2021-24078
CVE-2021-24084
CVE-2021-24075
CVE-2021-24082
CVE-2021-1731
CVE-2021-24083
CVE-2021-24079
CVE-2021-24096
CVE-2021-1722
CVE-2021-24098
CVE-2021-24074
CVE-2021-24088
CVE-2021-24081
CVE-2021-24077
CVE-2021-1698
CVE-2021-24106
CVE-2021-1732
CVE-2021-24091
CVE-2020-17162
ACE
CVE-2021-240806.5High
CVE-2021-241037.8Critical
CVE-2021-240938.8Critical
CVE-2021-17347.5Critical
CVE-2021-251957.8Critical
CVE-2021-240867.5Critical
CVE-2021-17277.8Critical
CVE-2021-241027.8Critical
CVE-2021-240949.8Critical
CVE-2021-240765.5High
CVE-2021-240789.8Critical
CVE-2021-240845.5High
CVE-2021-240756.8High
CVE-2021-240824.3Warning
CVE-2021-17315.5High
CVE-2021-240837.8Critical
CVE-2021-240795.5High
CVE-2021-240967.8Critical
CVE-2021-17228.1Critical
CVE-2021-240985.5High
CVE-2021-240749.8Critical
CVE-2021-240888.8Critical
CVE-2021-240817.8Critical
CVE-2021-240779.8Critical
CVE-2021-16987.8Critical
CVE-2021-241065.5High
CVE-2021-17327.8Critical
CVE-2021-240917.8Critical
CVE-2020-171628.8Critical
4571756
4570333
4577032
4577049
4577015
4577066
4574727
4577071
4601354
4601319
4601315
4601345
4601318
4601384
4601349
4601331
5008218
5008206
5008212
support.microsoft.com/kb/4570333
support.microsoft.com/kb/4571756
support.microsoft.com/kb/4574727
support.microsoft.com/kb/4577015
support.microsoft.com/kb/4577032
support.microsoft.com/kb/4577049
support.microsoft.com/kb/4577066
support.microsoft.com/kb/4577071
support.microsoft.com/kb/4601315
support.microsoft.com/kb/4601318
support.microsoft.com/kb/4601319
support.microsoft.com/kb/4601331
support.microsoft.com/kb/4601345
support.microsoft.com/kb/4601349
support.microsoft.com/kb/4601354
support.microsoft.com/kb/4601384
support.microsoft.com/kb/5008206
support.microsoft.com/kb/5008212
support.microsoft.com/kb/5008218
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17162
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1698
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1722
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1727
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1731
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1732
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1734
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-24074
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-24075
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-24076
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-24077
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-24078
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-24079
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-24080
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-24081
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-24082
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-24083
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-24084
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-24086
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-24088
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-24091
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-24093
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-24094
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-24096
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-24098
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-24102
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-24103
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-24106
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-25195
nvd.nist.gov/vuln/detail/CVE-2020-17162
nvd.nist.gov/vuln/detail/CVE-2021-1698
nvd.nist.gov/vuln/detail/CVE-2021-1722
nvd.nist.gov/vuln/detail/CVE-2021-1727
nvd.nist.gov/vuln/detail/CVE-2021-1731
nvd.nist.gov/vuln/detail/CVE-2021-1732
nvd.nist.gov/vuln/detail/CVE-2021-1734
nvd.nist.gov/vuln/detail/CVE-2021-24074
nvd.nist.gov/vuln/detail/CVE-2021-24075
nvd.nist.gov/vuln/detail/CVE-2021-24076
nvd.nist.gov/vuln/detail/CVE-2021-24077
nvd.nist.gov/vuln/detail/CVE-2021-24078
nvd.nist.gov/vuln/detail/CVE-2021-24079
nvd.nist.gov/vuln/detail/CVE-2021-24080
nvd.nist.gov/vuln/detail/CVE-2021-24081
nvd.nist.gov/vuln/detail/CVE-2021-24082
nvd.nist.gov/vuln/detail/CVE-2021-24083
nvd.nist.gov/vuln/detail/CVE-2021-24084
nvd.nist.gov/vuln/detail/CVE-2021-24086
nvd.nist.gov/vuln/detail/CVE-2021-24088
nvd.nist.gov/vuln/detail/CVE-2021-24091
nvd.nist.gov/vuln/detail/CVE-2021-24093
nvd.nist.gov/vuln/detail/CVE-2021-24094
nvd.nist.gov/vuln/detail/CVE-2021-24096
nvd.nist.gov/vuln/detail/CVE-2021-24098
nvd.nist.gov/vuln/detail/CVE-2021-24102
nvd.nist.gov/vuln/detail/CVE-2021-24103
nvd.nist.gov/vuln/detail/CVE-2021-24106
nvd.nist.gov/vuln/detail/CVE-2021-25195
portal.msrc.microsoft.com/en-us/security-guidance
statistics.securelist.com/vulnerability-scan/month
threats.kaspersky.com/en/class/Exploit/
threats.kaspersky.com/en/product/Microsoft-Windows-10/
threats.kaspersky.com/en/product/Microsoft-Windows-7/
threats.kaspersky.com/en/product/Microsoft-Windows-8/
threats.kaspersky.com/en/product/Microsoft-Windows-Server-2008/
threats.kaspersky.com/en/product/Microsoft-Windows-Server-2012/
threats.kaspersky.com/en/product/Microsoft-Windows-Server/
threats.kaspersky.com/en/product/Microsoft-Windows/
threats.kaspersky.com/en/product/Windows-RT/
9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9 High
AI Score
Confidence
High
7.5 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
0.386 Low
EPSS
Percentile
97.2%