8.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
9.2 High
AI Score
Confidence
High
9.3 High
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:C/I:C/A:C
07/13/2021
Critical
Multiple vulnerabilities were found in Microsoft Products (Extended Security Update). Malicious users can exploit these vulnerabilities to obtain sensitive information, spoof user interface, execute arbitrary code, cause denial of service, bypass security restrictions, gain privileges.
Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.
Windows 7 for 32-bit Systems Service Pack 1
Windows Server 2012 R2 (Server Core installation)
Windows Server 2016
Windows 10 Version 1909 for x64-based Systems
Windows 10 Version 1909 for 32-bit Systems
Windows Server 2008 R2 for x64-based Systems Service Pack 1
Windows 10 Version 21H1 for ARM64-based Systems
Windows 10 Version 2004 for 32-bit Systems
Windows Server 2012
Windows RT 8.1
Windows 10 Version 1909 for ARM64-based Systems
Windows 10 for 32-bit Systems
Windows 7 for x64-based Systems Service Pack 1
Windows 8.1 for x64-based systems
Windows Server 2008 for 32-bit Systems Service Pack 2
Windows 10 Version 2004 for x64-based Systems
Windows 10 Version 21H1 for x64-based Systems
Windows Server 2019
Windows Server 2019 (Server Core installation)
Windows 10 Version 1809 for 32-bit Systems
Windows 10 Version 1607 for x64-based Systems
Windows 10 Version 20H2 for ARM64-based Systems
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)
Windows Server 2016 (Server Core installation)
Windows 8.1 for 32-bit systems
Windows Server 2012 (Server Core installation)
Windows 10 Version 21H1 for 32-bit Systems
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation)
Windows Server 2012 R2
Windows 10 Version 1809 for ARM64-based Systems
Windows 10 Version 2004 for ARM64-based Systems
Windows 10 Version 20H2 for x64-based Systems
Windows 10 Version 1607 for 32-bit Systems
Windows 10 for x64-based Systems
Windows 10 Version 20H2 for 32-bit Systems
Windows Server 2008 for x64-based Systems Service Pack 2
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation)
Windows Server, version 2004 (Server Core installation)
Windows Server, version 20H2 (Server Core Installation)
Windows 10 Version 1809 for x64-based Systems
Install necessary updates from the KB section, that are listed in your Windows Update (Windows Update usually can be accessed from the Control Panel)
CVE-2021-33783
CVE-2021-34492
CVE-2021-34497
CVE-2021-34442
CVE-2021-34444
CVE-2021-33765
CVE-2021-34504
CVE-2021-33786
CVE-2021-34456
CVE-2021-34494
CVE-2021-33788
CVE-2021-33754
CVE-2021-34446
CVE-2021-33752
CVE-2021-31183
CVE-2021-33750
CVE-2021-33745
CVE-2021-31979
CVE-2021-33756
CVE-2021-34440
CVE-2021-33749
CVE-2021-33764
CVE-2021-34448
CVE-2021-34499
CVE-2021-33757
CVE-2021-34457
CVE-2021-34441
CVE-2021-34507
CVE-2021-33746
CVE-2021-34498
CVE-2021-34516
CVE-2021-34447
CVE-2021-33780
CVE-2021-34476
CVE-2021-34511
CVE-2021-33782
CVE-2021-34514
CVE-2021-34500
CVE-2021-34496
ACE
CVE-2021-344976.8High
CVE-2021-344446.5High
CVE-2021-345047.8Critical
CVE-2021-344567.8Critical
CVE-2021-337887.5Critical
CVE-2021-344948.8Critical
CVE-2021-344468.0Critical
CVE-2021-311837.5Critical
CVE-2021-337456.5High
CVE-2021-344405.5High
CVE-2021-337498.8Critical
CVE-2021-337645.9High
CVE-2021-337575.3High
CVE-2021-344417.8Critical
CVE-2021-345076.5High
CVE-2021-345167.8Critical
CVE-2021-337808.8Critical
CVE-2021-344767.5Critical
CVE-2021-345117.8Critical
CVE-2021-345006.3High
CVE-2021-344965.5High
CVE-2021-337836.5High
CVE-2021-344928.1Critical
CVE-2021-344428.8Critical
CVE-2021-337656.2High
CVE-2021-337868.1Critical
CVE-2021-337548.0Critical
CVE-2021-337528.8Critical
CVE-2021-337508.8Critical
CVE-2021-319797.8Critical
CVE-2021-337568.8Critical
CVE-2021-344486.8High
CVE-2021-344996.5High
CVE-2021-344575.5High
CVE-2021-337468.0Critical
CVE-2021-344987.8Critical
CVE-2021-344476.8High
CVE-2021-337825.5High
CVE-2021-345147.8Critical
5004289
5004307
5004299
5004305
5005563
5010384
5010422
5010403
5010404
support.microsoft.com/kb/5004289
support.microsoft.com/kb/5004299
support.microsoft.com/kb/5004305
support.microsoft.com/kb/5004307
support.microsoft.com/kb/5005563
support.microsoft.com/kb/5010384
support.microsoft.com/kb/5010403
support.microsoft.com/kb/5010404
support.microsoft.com/kb/5010422
api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-31183
api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-31979
api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-33745
api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-33746
api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-33749
api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-33750
api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-33752
api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-33754
api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-33756
api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-33757
api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-33764
api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-33765
api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-33780
api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-33782
api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-33783
api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-33786
api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-33788
api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-34440
api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-34441
api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-34442
api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-34444
api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-34446
api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-34447
api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-34448
api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-34456
api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-34457
api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-34476
api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-34492
api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-34494
api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-34496
api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-34497
api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-34498
api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-34499
api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-34500
api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-34504
api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-34507
api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-34511
api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-34514
api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-34516
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31183
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31979
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33745
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33746
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33749
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33750
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33752
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33754
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33756
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33757
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33764
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33765
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33780
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33782
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33783
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33786
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33788
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34440
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34441
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34442
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34444
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34446
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34447
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34448
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34456
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34457
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34476
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34492
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34494
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34496
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34497
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34498
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34499
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34500
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34504
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34507
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34511
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34514
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34516
portal.msrc.microsoft.com/en-us/security-guidance
statistics.securelist.com/vulnerability-scan/month
threats.kaspersky.com/en/class/Exploit/
threats.kaspersky.com/en/product/Microsoft-Windows-10/
threats.kaspersky.com/en/product/Microsoft-Windows-7/
threats.kaspersky.com/en/product/Microsoft-Windows-8/
threats.kaspersky.com/en/product/Microsoft-Windows-Server-2008/
threats.kaspersky.com/en/product/Microsoft-Windows-Server-2012/
threats.kaspersky.com/en/product/Microsoft-Windows-Server/
threats.kaspersky.com/en/product/Microsoft-Windows/
threats.kaspersky.com/en/product/Windows-RT/
8.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
9.2 High
AI Score
Confidence
High
9.3 High
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:C/I:C/A:C