9.4 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L
9.6 High
AI Score
Confidence
High
9.3 High
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:C/I:C/A:C
0.968 High
EPSS
Percentile
99.7%
06/08/2021
Critical
Multiple vulnerabilities were found in Microsoft Products (Extended Security Update). Malicious users can exploit these vulnerabilities to gain privileges, execute arbitrary code, cause denial of service, bypass security restrictions, obtain sensitive information.
Public exploits exist for this vulnerability.
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation)
Windows Server 2012 R2 (Server Core installation)
Windows Server 2008 for x64-based Systems Service Pack 2
Windows Server 2012
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation)
Windows Server 2012 (Server Core installation)
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)
Windows 7 for 32-bit Systems Service Pack 1
Windows Server 2008 for 32-bit Systems Service Pack 2
Windows Server 2012 R2
Windows Server 2008 R2 for x64-based Systems Service Pack 1
Windows 7 for x64-based Systems Service Pack 1
Install necessary updates from the KB section, that are listed in your Windows Update (Windows Update usually can be accessed from the Control Panel)
CVE-2021-31956
CVE-2021-31973
CVE-2021-33742
CVE-2021-31954
CVE-2021-31201
CVE-2021-31199
CVE-2021-1675
CVE-2021-31953
CVE-2021-31968
CVE-2021-31958
CVE-2021-31971
CVE-2021-26414
CVE-2021-31959
CVE-2021-31962
CVE-2021-31976
CVE-2021-31974
CVE-2021-31975
CVE-2021-31970
CVE-2021-31972
ACE
CVE-2021-319567.8Critical
CVE-2021-319737.8Critical
CVE-2021-337427.5Critical
CVE-2021-319547.8Critical
CVE-2021-312015.2High
CVE-2021-311995.2High
CVE-2021-16757.8Critical
CVE-2021-319537.8Critical
CVE-2021-319687.5Critical
CVE-2021-319587.5Critical
CVE-2021-319716.8High
CVE-2021-264144.8Warning
CVE-2021-319596.4High
CVE-2021-319629.4Critical
CVE-2021-319757.5Critical
CVE-2021-319725.5High
CVE-2021-319767.5Critical
CVE-2021-319705.5High
CVE-2021-319747.5Critical
5003695
5003636
5003661
5003667
5003694
5003681
5003671
5003696
5003697
5014742
5014748
5023752
5023764
5023756
5023765
5023755
5023754
5023759
5023769
support.microsoft.com/kb/5003636
support.microsoft.com/kb/5003661
support.microsoft.com/kb/5003667
support.microsoft.com/kb/5003671
support.microsoft.com/kb/5003681
support.microsoft.com/kb/5003694
support.microsoft.com/kb/5003695
support.microsoft.com/kb/5003696
support.microsoft.com/kb/5003697
support.microsoft.com/kb/5014742
support.microsoft.com/kb/5014748
support.microsoft.com/kb/5023752
support.microsoft.com/kb/5023754
support.microsoft.com/kb/5023755
support.microsoft.com/kb/5023756
support.microsoft.com/kb/5023759
support.microsoft.com/kb/5023764
support.microsoft.com/kb/5023765
support.microsoft.com/kb/5023769
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1675
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26414
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31199
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31201
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31953
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31954
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31956
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31958
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31959
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31962
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31968
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31970
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31971
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31972
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31973
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31974
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31975
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31976
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33742
msrc.microsoft.com/update-guide/vulnerability/CVE-2021-1675
msrc.microsoft.com/update-guide/vulnerability/CVE-2021-26414
msrc.microsoft.com/update-guide/vulnerability/CVE-2021-31199
msrc.microsoft.com/update-guide/vulnerability/CVE-2021-31201
msrc.microsoft.com/update-guide/vulnerability/CVE-2021-31953
msrc.microsoft.com/update-guide/vulnerability/CVE-2021-31954
msrc.microsoft.com/update-guide/vulnerability/CVE-2021-31956
msrc.microsoft.com/update-guide/vulnerability/CVE-2021-31958
msrc.microsoft.com/update-guide/vulnerability/CVE-2021-31959
msrc.microsoft.com/update-guide/vulnerability/CVE-2021-31962
msrc.microsoft.com/update-guide/vulnerability/CVE-2021-31968
msrc.microsoft.com/update-guide/vulnerability/CVE-2021-31970
msrc.microsoft.com/update-guide/vulnerability/CVE-2021-31971
msrc.microsoft.com/update-guide/vulnerability/CVE-2021-31972
msrc.microsoft.com/update-guide/vulnerability/CVE-2021-31973
msrc.microsoft.com/update-guide/vulnerability/CVE-2021-31974
msrc.microsoft.com/update-guide/vulnerability/CVE-2021-31975
msrc.microsoft.com/update-guide/vulnerability/CVE-2021-31976
msrc.microsoft.com/update-guide/vulnerability/CVE-2021-33742
portal.msrc.microsoft.com/en-us/security-guidance
statistics.securelist.com/vulnerability-scan/month
threats.kaspersky.com/en/class/Exploit/
threats.kaspersky.com/en/product/Microsoft-Windows-7/
threats.kaspersky.com/en/product/Microsoft-Windows-Server-2008/
threats.kaspersky.com/en/product/Microsoft-Windows-Server-2012/
threats.kaspersky.com/en/product/Microsoft-Windows-Server/
threats.kaspersky.com/en/product/Microsoft-Windows/
9.4 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L
9.6 High
AI Score
Confidence
High
9.3 High
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:C/I:C/A:C
0.968 High
EPSS
Percentile
99.7%