9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10 High
AI Score
Confidence
High
7.5 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
0.051 Low
EPSS
Percentile
92.8%
02/09/2021
Critical
Multiple vulnerabilities were found in Microsoft Products (Extended Support Update). Malicious users can exploit these vulnerabilities to cause denial of service, gain privileges, obtain sensitive information, execute arbitrary code, bypass security restrictions.
Public exploits exist for this vulnerability.
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation)
Windows Server 2012
Windows Server 2008 for x64-based Systems Service Pack 2
Windows Server 2008 for 32-bit Systems Service Pack 2
Windows Server 2008 R2 for x64-based Systems Service Pack 1
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation)
Windows 7 for x64-based Systems Service Pack 1
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)
Windows Server 2012 R2 (Server Core installation)
Windows Server 2012 R2
Windows 7 for 32-bit Systems Service Pack 1
Windows Server 2012 (Server Core installation)
Install necessary updates from the KB section, that are listed in your Windows Update (Windows Update usually can be accessed from the Control Panel)
CVE-2021-24080
CVE-2021-24103
CVE-2021-1734
CVE-2021-25195
CVE-2021-24086
CVE-2021-1727
CVE-2021-24102
CVE-2021-24094
CVE-2021-24078
CVE-2021-24083
CVE-2021-1722
CVE-2021-24074
CVE-2021-24088
CVE-2021-24077
CVE-2021-24076
CVE-2020-17162
CVE-2021-24079
ACE
CVE-2021-240806.5High
CVE-2021-241037.8Critical
CVE-2021-17347.5Critical
CVE-2021-251957.8Critical
CVE-2021-240867.5Critical
CVE-2021-17277.8Critical
CVE-2021-241027.8Critical
CVE-2021-240949.8Critical
CVE-2021-240765.5High
CVE-2021-240789.8Critical
CVE-2021-240837.8Critical
CVE-2021-240795.5High
CVE-2021-17228.1Critical
CVE-2021-240749.8Critical
CVE-2021-240888.8Critical
CVE-2021-240779.8Critical
CVE-2020-171628.8Critical
4577048
4577066
4577071
4577038
4601347
4601363
4601357
4601348
4601384
4601349
4601360
4601366
support.microsoft.com/kb/4577038
support.microsoft.com/kb/4577048
support.microsoft.com/kb/4577066
support.microsoft.com/kb/4577071
support.microsoft.com/kb/4601347
support.microsoft.com/kb/4601348
support.microsoft.com/kb/4601349
support.microsoft.com/kb/4601357
support.microsoft.com/kb/4601360
support.microsoft.com/kb/4601363
support.microsoft.com/kb/4601366
support.microsoft.com/kb/4601384
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17162
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1722
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1727
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1734
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-24074
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-24076
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-24077
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-24078
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-24079
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-24080
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-24083
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-24086
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-24088
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-24094
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-24102
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-24103
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-25195
msrc.microsoft.com/update-guide/vulnerability/CVE-2020-17162
msrc.microsoft.com/update-guide/vulnerability/CVE-2021-1722
msrc.microsoft.com/update-guide/vulnerability/CVE-2021-1727
msrc.microsoft.com/update-guide/vulnerability/CVE-2021-1734
msrc.microsoft.com/update-guide/vulnerability/CVE-2021-24074
msrc.microsoft.com/update-guide/vulnerability/CVE-2021-24076
msrc.microsoft.com/update-guide/vulnerability/CVE-2021-24077
msrc.microsoft.com/update-guide/vulnerability/CVE-2021-24078
msrc.microsoft.com/update-guide/vulnerability/CVE-2021-24079
msrc.microsoft.com/update-guide/vulnerability/CVE-2021-24080
msrc.microsoft.com/update-guide/vulnerability/CVE-2021-24083
msrc.microsoft.com/update-guide/vulnerability/CVE-2021-24086
msrc.microsoft.com/update-guide/vulnerability/CVE-2021-24088
msrc.microsoft.com/update-guide/vulnerability/CVE-2021-24094
msrc.microsoft.com/update-guide/vulnerability/CVE-2021-24102
msrc.microsoft.com/update-guide/vulnerability/CVE-2021-24103
msrc.microsoft.com/update-guide/vulnerability/CVE-2021-25195
portal.msrc.microsoft.com/en-us/security-guidance
statistics.securelist.com/vulnerability-scan/month
threats.kaspersky.com/en/class/Exploit/
threats.kaspersky.com/en/product/Microsoft-Windows-7/
threats.kaspersky.com/en/product/Microsoft-Windows-Server-2008/
threats.kaspersky.com/en/product/Microsoft-Windows-Server-2012/
threats.kaspersky.com/en/product/Microsoft-Windows-Server/
threats.kaspersky.com/en/product/Microsoft-Windows/
9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10 High
AI Score
Confidence
High
7.5 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
0.051 Low
EPSS
Percentile
92.8%