9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
8.8 High
AI Score
Confidence
High
7.8 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:N/I:N/A:C
12/14/2021
High
Multiple vulnerabilities were found in Microsoft Windows. Malicious users can exploit these vulnerabilities to execute arbitrary code, cause denial of service, gain privileges, obtain sensitive information.
Public exploits exist for this vulnerability.
Windows Server, version 20H2 (Server Core Installation)
Windows 11 for x64-based Systems
Windows 10 Version 2004 for 32-bit Systems
Windows Server 2022
Windows 8.1 for x64-based systems
Windows Server, version 2004 (Server Core installation)
Windows 10 for 32-bit Systems
Windows 7 for x64-based Systems Service Pack 1
Windows 10 Version 21H2 for 32-bit Systems
Windows 7 for 32-bit Systems Service Pack 1
Windows Server 2022 (Server Core installation)
Windows 10 Version 1809 for x64-based Systems
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)
Windows Server 2008 for x64-based Systems Service Pack 2
Windows 10 Version 1607 for x64-based Systems
Windows 10 Version 21H1 for ARM64-based Systems
Windows 8.1 for 32-bit systems
Windows RT 8.1
Windows 10 Version 1809 for ARM64-based Systems
Windows Server 2016
Windows Server 2019
Windows 10 Version 21H1 for x64-based Systems
Windows 10 Version 1909 for ARM64-based Systems
Windows 10 Version 21H2 for ARM64-based Systems
Windows 10 Version 21H2 for x64-based Systems
Windows 10 Version 20H2 for x64-based Systems
Windows 10 Version 1909 for x64-based Systems
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation)
Windows Server 2019 (Server Core installation)
Windows 10 Version 20H2 for ARM64-based Systems
Windows 10 Version 20H2 for 32-bit Systems
Windows 10 Version 1909 for 32-bit Systems
Windows Server 2012 R2 (Server Core installation)
Windows 11 for ARM64-based Systems
Windows 10 Version 1607 for 32-bit Systems
Windows Server 2008 for 32-bit Systems Service Pack 2
Windows Server 2016 (Server Core installation)
Windows Server 2012 R2
Windows 10 Version 21H1 for 32-bit Systems
Windows 10 Version 2004 for x64-based Systems
Windows Server 2012 (Server Core installation)
Windows 10 Version 2004 for ARM64-based Systems
Windows Server 2012
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation)
Windows 10 for x64-based Systems
Windows Server 2008 R2 for x64-based Systems Service Pack 1
Windows 10 Version 1809 for 32-bit Systems
Install necessary updates from the KB section, that are listed in your Windows Update (Windows Update usually can be accessed from the Control Panel)
CVE-2021-43217
CVE-2021-43246
CVE-2021-43231
CVE-2021-43227
CVE-2021-40452
CVE-2021-43216
CVE-2021-43219
CVE-2021-43235
CVE-2021-43223
CVE-2021-43238
CVE-2021-43883
CVE-2021-43229
CVE-2021-43239
CVE-2021-43226
CVE-2021-43232
CVE-2021-43234
CVE-2021-40453
CVE-2021-43215
CVE-2021-43880
CVE-2021-43237
CVE-2021-43893
CVE-2021-43230
CVE-2021-43224
CVE-2021-43247
CVE-2021-43222
CVE-2021-41360
CVE-2021-43244
CVE-2021-43233
CVE-2021-43243
CVE-2021-43228
CVE-2021-43245
CVE-2021-43214
CVE-2021-40441
CVE-2021-43248
CVE-2021-41333
CVE-2021-43236
CVE-2021-43207
CVE-2021-43240
ACE
CVE-2021-432179.8Critical
CVE-2021-432465.6High
CVE-2021-432317.8Critical
CVE-2021-432275.5High
CVE-2021-404527.8Critical
CVE-2021-432166.5High
CVE-2021-432197.5Critical
CVE-2021-432355.5High
CVE-2021-432237.8Critical
CVE-2021-432387.8Critical
CVE-2021-438837.8Critical
CVE-2021-432297.8Critical
CVE-2021-432397.8Critical
CVE-2021-432267.8Critical
CVE-2021-432327.8Critical
CVE-2021-432347.8Critical
CVE-2021-404537.8Critical
CVE-2021-432159.8Critical
CVE-2021-438805.5High
CVE-2021-432377.3High
CVE-2021-438937.5Critical
CVE-2021-432307.8Critical
CVE-2021-432245.5High
CVE-2021-432477.8Critical
CVE-2021-432227.5Critical
CVE-2021-413607.8Critical
CVE-2021-432445.5High
CVE-2021-432337.5Critical
CVE-2021-432435.5High
CVE-2021-432287.5Critical
CVE-2021-432457.8Critical
CVE-2021-432149.8Critical
CVE-2021-404417.8Critical
CVE-2021-432487.8Critical
CVE-2021-413337.8Critical
CVE-2021-432367.5Critical
CVE-2021-432077.8Critical
CVE-2021-432407.8Critical
5008223
5008215
5008218
5008206
5008212
5008263
5008230
5008207
5008285
5015877
5015874
support.microsoft.com/kb/5008206
support.microsoft.com/kb/5008207
support.microsoft.com/kb/5008212
support.microsoft.com/kb/5008215
support.microsoft.com/kb/5008218
support.microsoft.com/kb/5008223
support.microsoft.com/kb/5008230
support.microsoft.com/kb/5008263
support.microsoft.com/kb/5008285
support.microsoft.com/kb/5015874
support.microsoft.com/kb/5015877
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-40441
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-40452
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-40453
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41333
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41360
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43207
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43214
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43215
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43216
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43217
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43219
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43222
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43223
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43224
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43226
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43227
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43228
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43229
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43230
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43231
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43232
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43233
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43234
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43235
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43236
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43237
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43238
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43239
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43240
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43243
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43244
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43245
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43246
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43247
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43248
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43880
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43883
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43893
nvd.nist.gov/vuln/detail/CVE-2021-40441
nvd.nist.gov/vuln/detail/CVE-2021-40452
nvd.nist.gov/vuln/detail/CVE-2021-40453
nvd.nist.gov/vuln/detail/CVE-2021-41333
nvd.nist.gov/vuln/detail/CVE-2021-41360
nvd.nist.gov/vuln/detail/CVE-2021-43207
nvd.nist.gov/vuln/detail/CVE-2021-43214
nvd.nist.gov/vuln/detail/CVE-2021-43215
nvd.nist.gov/vuln/detail/CVE-2021-43216
nvd.nist.gov/vuln/detail/CVE-2021-43217
nvd.nist.gov/vuln/detail/CVE-2021-43219
nvd.nist.gov/vuln/detail/CVE-2021-43222
nvd.nist.gov/vuln/detail/CVE-2021-43223
nvd.nist.gov/vuln/detail/CVE-2021-43224
nvd.nist.gov/vuln/detail/CVE-2021-43226
nvd.nist.gov/vuln/detail/CVE-2021-43227
nvd.nist.gov/vuln/detail/CVE-2021-43228
nvd.nist.gov/vuln/detail/CVE-2021-43229
nvd.nist.gov/vuln/detail/CVE-2021-43230
nvd.nist.gov/vuln/detail/CVE-2021-43231
nvd.nist.gov/vuln/detail/CVE-2021-43232
nvd.nist.gov/vuln/detail/CVE-2021-43233
nvd.nist.gov/vuln/detail/CVE-2021-43234
nvd.nist.gov/vuln/detail/CVE-2021-43235
nvd.nist.gov/vuln/detail/CVE-2021-43236
nvd.nist.gov/vuln/detail/CVE-2021-43237
nvd.nist.gov/vuln/detail/CVE-2021-43238
nvd.nist.gov/vuln/detail/CVE-2021-43239
nvd.nist.gov/vuln/detail/CVE-2021-43240
nvd.nist.gov/vuln/detail/CVE-2021-43243
nvd.nist.gov/vuln/detail/CVE-2021-43244
nvd.nist.gov/vuln/detail/CVE-2021-43245
nvd.nist.gov/vuln/detail/CVE-2021-43246
nvd.nist.gov/vuln/detail/CVE-2021-43247
nvd.nist.gov/vuln/detail/CVE-2021-43248
nvd.nist.gov/vuln/detail/CVE-2021-43880
nvd.nist.gov/vuln/detail/CVE-2021-43883
nvd.nist.gov/vuln/detail/CVE-2021-43893
portal.msrc.microsoft.com/en-us/security-guidance
statistics.securelist.com/vulnerability-scan/month
threats.kaspersky.com/en/class/Exploit/
threats.kaspersky.com/en/product/Microsoft-Windows-10/
threats.kaspersky.com/en/product/Microsoft-Windows-7/
threats.kaspersky.com/en/product/Microsoft-Windows-8/
threats.kaspersky.com/en/product/Microsoft-Windows-Server-2008/
threats.kaspersky.com/en/product/Microsoft-Windows-Server-2012/
threats.kaspersky.com/en/product/Microsoft-Windows-Server-2016/
threats.kaspersky.com/en/product/Microsoft-Windows-Server-2019/
threats.kaspersky.com/en/product/Microsoft-Windows-Server/
threats.kaspersky.com/en/product/Microsoft-Windows/
threats.kaspersky.com/en/product/Windows-RT/
9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
8.8 High
AI Score
Confidence
High
7.8 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:N/I:N/A:C