9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
8.8 High
AI Score
Confidence
High
10 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:C/I:C/A:C
0.065 Low
EPSS
Percentile
93.6%
03/09/2021
Critical
Multiple vulnerabilities were found in Microsoft Products (Extended Security Update). Malicious users can exploit these vulnerabilities to execute arbitrary code, gain privileges, cause denial of service, obtain sensitive information.
Public exploits exist for this vulnerability.
Windows 7 for 32-bit Systems Service Pack 1
Windows Server 2008 for x64-based Systems Service Pack 2
Windows 7 for x64-based Systems Service Pack 1
Windows Server 2008 for 32-bit Systems Service Pack 2
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation)
Internet Explorer 9
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)
Windows Server 2008 R2 for x64-based Systems Service Pack 1
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation)
Install necessary updates from the KB section, that are listed in your Windows Update (Windows Update usually can be accessed from the Control Panel)
CVE-2021-26411
CVE-2021-26899
CVE-2021-26875
CVE-2021-27063
CVE-2021-26895
CVE-2021-24107
CVE-2021-26878
CVE-2021-27077
CVE-2021-26894
CVE-2021-26898
CVE-2021-26893
CVE-2021-26896
CVE-2021-26869
CVE-2021-26877
CVE-2021-1640
CVE-2021-26897
CVE-2021-26872
CVE-2021-26861
CVE-2021-26901
CVE-2021-26881
CVE-2021-26882
CVE-2021-26862
CVE-2021-26873
CVE-2021-26887
ACE
CVE-2021-264118.8Critical
CVE-2021-268997.8Critical
CVE-2021-268757.8Critical
CVE-2021-270637.5Critical
CVE-2021-268959.8Critical
CVE-2021-241075.5High
CVE-2021-268877.8Critical
CVE-2021-268787.8Critical
CVE-2021-270777.8Critical
CVE-2021-268949.8Critical
CVE-2021-268987.8Critical
CVE-2021-268939.8Critical
CVE-2021-268967.5Critical
CVE-2021-268695.5High
CVE-2021-268779.8Critical
CVE-2021-16407.8Critical
CVE-2021-268979.8Critical
CVE-2021-268727.8Critical
CVE-2021-268617.8Critical
CVE-2021-269017.8Critical
CVE-2021-268817.5Critical
CVE-2021-268827.8Critical
CVE-2021-268627.0High
CVE-2021-268737.0High
5000800
5000841
5000851
5000856
5000844
support.microsoft.com/kb/5000800
support.microsoft.com/kb/5000841
support.microsoft.com/kb/5000844
support.microsoft.com/kb/5000851
support.microsoft.com/kb/5000856
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1640
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-24107
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26411
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26861
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26862
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26869
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26872
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26873
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26875
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26877
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26878
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26881
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26882
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26887
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26893
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26894
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26895
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26896
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26897
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26898
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26899
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26901
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27063
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27077
msrc.microsoft.com/update-guide/vulnerability/CVE-2021-1640
msrc.microsoft.com/update-guide/vulnerability/CVE-2021-24107
msrc.microsoft.com/update-guide/vulnerability/CVE-2021-26411
msrc.microsoft.com/update-guide/vulnerability/CVE-2021-26861
msrc.microsoft.com/update-guide/vulnerability/CVE-2021-26862
msrc.microsoft.com/update-guide/vulnerability/CVE-2021-26869
msrc.microsoft.com/update-guide/vulnerability/CVE-2021-26872
msrc.microsoft.com/update-guide/vulnerability/CVE-2021-26873
msrc.microsoft.com/update-guide/vulnerability/CVE-2021-26875
msrc.microsoft.com/update-guide/vulnerability/CVE-2021-26877
msrc.microsoft.com/update-guide/vulnerability/CVE-2021-26878
msrc.microsoft.com/update-guide/vulnerability/CVE-2021-26881
msrc.microsoft.com/update-guide/vulnerability/CVE-2021-26882
msrc.microsoft.com/update-guide/vulnerability/CVE-2021-26887
msrc.microsoft.com/update-guide/vulnerability/CVE-2021-26893
msrc.microsoft.com/update-guide/vulnerability/CVE-2021-26894
msrc.microsoft.com/update-guide/vulnerability/CVE-2021-26895
msrc.microsoft.com/update-guide/vulnerability/CVE-2021-26896
msrc.microsoft.com/update-guide/vulnerability/CVE-2021-26897
msrc.microsoft.com/update-guide/vulnerability/CVE-2021-26898
msrc.microsoft.com/update-guide/vulnerability/CVE-2021-26899
msrc.microsoft.com/update-guide/vulnerability/CVE-2021-26901
msrc.microsoft.com/update-guide/vulnerability/CVE-2021-27063
msrc.microsoft.com/update-guide/vulnerability/CVE-2021-27077
portal.msrc.microsoft.com/en-us/security-guidance
statistics.securelist.com/vulnerability-scan/month
threats.kaspersky.com/en/class/Exploit/
threats.kaspersky.com/en/product/Microsoft-Internet-Explorer/
threats.kaspersky.com/en/product/Microsoft-Windows-7/
threats.kaspersky.com/en/product/Microsoft-Windows-Server-2008/
threats.kaspersky.com/en/product/Microsoft-Windows-Server/
threats.kaspersky.com/en/product/Microsoft-Windows/
9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
8.8 High
AI Score
Confidence
High
10 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:C/I:C/A:C
0.065 Low
EPSS
Percentile
93.6%