8.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
9 High
AI Score
Confidence
Low
6.8 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:P/I:P/A:P
0.023 Low
EPSS
Percentile
89.6%
10/11/2022
Critical
Multiple vulnerabilities were found in Microsoft Products (Extended Security Update). Malicious users can exploit these vulnerabilities to gain privileges, spoof user interface, obtain sensitive information, cause denial of service, execute arbitrary code, bypass security restrictions.
Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.
Windows 7 for 32-bit Systems Service Pack 1
Windows Server 2008 for 32-bit Systems Service Pack 2
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation)
Windows 7 for x64-based Systems Service Pack 1
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation)
Windows Server 2008 R2 for x64-based Systems Service Pack 1
Windows Server 2008 for x64-based Systems Service Pack 2
Windows Server 2012 (Server Core installation)
Windows Server 2012
Windows Server 2012 R2 (Server Core installation)
Windows Server 2012 R2
Install necessary updates from the KB section, that are listed in your Windows Update (Windows Update usually can be accessed from the Control Panel)
CVE-2022-41033
CVE-2022-38029
CVE-2022-37994
CVE-2022-34689
CVE-2022-37985
CVE-2022-37975
CVE-2022-37999
CVE-2022-38032
CVE-2022-38051
CVE-2022-37976
CVE-2022-38042
CVE-2022-38047
CVE-2022-38044
CVE-2022-37981
CVE-2022-24504
CVE-2022-38040
CVE-2022-33634
CVE-2022-37990
CVE-2022-37982
CVE-2022-37997
CVE-2022-33635
CVE-2022-22035
CVE-2022-38038
CVE-2022-38043
CVE-2022-37988
CVE-2022-37991
CVE-2022-37993
CVE-2022-38026
CVE-2022-38041
CVE-2022-30198
CVE-2022-33645
CVE-2022-38034
CVE-2022-37977
CVE-2022-38033
CVE-2022-38022
CVE-2022-37986
CVE-2022-38037
CVE-2022-41081
CVE-2022-37987
CVE-2022-38031
CVE-2022-38000
CVE-2022-35770
CVE-2022-37989
CVE-2022-37978
CVE-2022-38027
CVE-2022-37996
CVE-2022-37965
CVE-2022-38028
CVE-2022-37984
CVE-2022-38045
ACE
CVE-2022-380297.0High
CVE-2022-346897.5Critical
CVE-2022-379855.5High
CVE-2022-379758.8Critical
CVE-2022-379965.5High
CVE-2022-379655.9High
CVE-2022-380427.1High
CVE-2022-379847.8Critical
CVE-2022-379814.3Warning
CVE-2022-245048.1Critical
CVE-2022-336348.1Critical
CVE-2022-379907.8Critical
CVE-2022-380387.8Critical
CVE-2022-379917.8Critical
CVE-2022-379937.8Critical
CVE-2022-380417.5Critical
CVE-2022-380277.0High
CVE-2022-336457.5Critical
CVE-2022-380348.8Critical
CVE-2022-379776.5High
CVE-2022-380336.5High
CVE-2022-380377.8Critical
CVE-2022-380287.8Critical
CVE-2022-380008.1Critical
CVE-2022-379897.8Critical
CVE-2022-379787.5Critical
CVE-2022-410337.8Critical
CVE-2022-379947.8Critical
CVE-2022-379997.8Critical
CVE-2022-380326.6High
CVE-2022-380458.8Critical
CVE-2022-380517.8Critical
CVE-2022-379768.8Critical
CVE-2022-380478.1Critical
CVE-2022-380447.8Critical
CVE-2022-380408.8Critical
CVE-2022-379828.8Critical
CVE-2022-379977.8Critical
CVE-2022-336357.8Critical
CVE-2022-220358.1Critical
CVE-2022-380435.5High
CVE-2022-379887.8Critical
CVE-2022-380265.5High
CVE-2022-301988.1Critical
CVE-2022-380223.3Warning
CVE-2022-379867.8Critical
CVE-2022-410818.1Critical
CVE-2022-379877.8Critical
CVE-2022-380318.8Critical
CVE-2022-357706.5High
5016672
5016622
5016683
5016684
5016681
5016686
5016669
5016679
5016676
5018474
5018478
5018476
5018457
5018446
5018479
5018450
5018454
support.microsoft.com/kb/5016622
support.microsoft.com/kb/5016669
support.microsoft.com/kb/5016672
support.microsoft.com/kb/5016676
support.microsoft.com/kb/5016679
support.microsoft.com/kb/5016681
support.microsoft.com/kb/5016683
support.microsoft.com/kb/5016684
support.microsoft.com/kb/5016686
support.microsoft.com/kb/5018446
support.microsoft.com/kb/5018450
support.microsoft.com/kb/5018454
support.microsoft.com/kb/5018457
support.microsoft.com/kb/5018474
support.microsoft.com/kb/5018476
support.microsoft.com/kb/5018478
support.microsoft.com/kb/5018479
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22035
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24504
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30198
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33634
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33635
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33645
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34689
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-35770
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-37965
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-37975
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-37976
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-37977
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-37978
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-37981
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-37982
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-37984
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-37985
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-37986
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-37987
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-37988
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-37989
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-37990
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-37991
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-37993
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-37994
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-37996
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-37997
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-37999
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38000
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38022
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38026
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38027
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38028
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38029
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38031
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38032
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38033
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38034
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38037
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38038
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38040
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38041
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38042
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38043
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38044
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38045
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38047
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38051
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41033
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41081
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-22035
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-24504
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30198
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-33634
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-33635
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-33645
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-34689
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35770
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-37965
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-37975
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-37976
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-37977
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-37978
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-37981
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-37982
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-37984
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-37985
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-37986
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-37987
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-37988
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-37989
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-37990
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-37991
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-37993
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-37994
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-37996
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-37997
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-37999
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-38000
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-38022
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-38026
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-38027
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-38028
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-38029
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-38031
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-38032
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-38033
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-38034
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-38037
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-38038
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-38040
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-38041
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-38042
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-38043
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-38044
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-38045
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-38047
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-38051
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-41033
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-41081
portal.msrc.microsoft.com/en-us/security-guidance
statistics.securelist.com/vulnerability-scan/month
threats.kaspersky.com/en/class/Exploit/
threats.kaspersky.com/en/product/Microsoft-Windows-7/
threats.kaspersky.com/en/product/Microsoft-Windows-Server-2008/
threats.kaspersky.com/en/product/Microsoft-Windows-Server-2012/
threats.kaspersky.com/en/product/Microsoft-Windows-Server/
threats.kaspersky.com/en/product/Microsoft-Windows/
8.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
9 High
AI Score
Confidence
Low
6.8 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:P/I:P/A:P
0.023 Low
EPSS
Percentile
89.6%