Lucene search

K
kasperskyKaspersky LabKLA20154
HistoryJan 10, 2023 - 12:00 a.m.

KLA20154 Multiple vulnerabilities in Microsoft Windows

2023-01-1000:00:00
Kaspersky Lab
threats.kaspersky.com
242

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

8.8 High

AI Score

Confidence

Low

6.8 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

0.113 Low

EPSS

Percentile

95.1%

Detect date:

01/10/2023

Severity:

Critical

Description:

Multiple vulnerabilities were found in Microsoft Windows. Malicious users can exploit these vulnerabilities to cause denial of service, gain privileges, obtain sensitive information, execute arbitrary code, bypass security restrictions.

Exploitation:

Public exploits exist for this vulnerability.

Affected products:

Windows 8.1 for x64-based systems
Windows Server 2022 (Server Core installation)
Windows 10 Version 21H2 for x64-based Systems
Windows 10 for x64-based Systems
Windows 10 Version 1607 for x64-based Systems
Windows 11 version 21H2 for ARM64-based Systems
Windows 10 Version 20H2 for 32-bit Systems
Windows 10 Version 20H2 for ARM64-based Systems
Windows Server 2012 (Server Core installation)
Windows Server 2012
Windows 10 Version 21H2 for ARM64-based Systems
Windows 10 for 32-bit Systems
Windows 10 Version 1607 for 32-bit Systems
Windows 10 Version 22H2 for 32-bit Systems
Windows 10 Version 1809 for ARM64-based Systems
Windows 8.1 for 32-bit systems
Windows Server 2016 (Server Core installation)
Windows 11 Version 22H2 for x64-based Systems
Windows RT 8.1
Windows Server 2019
Windows 10 Version 22H2 for x64-based Systems
Windows 11 version 21H2 for x64-based Systems
Windows 10 Version 20H2 for x64-based Systems
Windows 10 Version 1809 for 32-bit Systems
Windows 10 Version 22H2 for ARM64-based Systems
Windows Server 2012 R2 (Server Core installation)
Windows 10 Version 1809 for x64-based Systems
Windows Server 2016
Windows 10 Version 21H2 for 32-bit Systems
Windows Server 2022
Windows Server 2019 (Server Core installation)
Windows 11 Version 22H2 for ARM64-based Systems
Windows Server 2012 R2

Solution:

Install necessary updates from the KB section, that are listed in your Windows Update (Windows Update usually can be accessed from the Control Panel)

Original advisories:

CVE-2023-21757
CVE-2023-21730
CVE-2023-21766
CVE-2023-21555
CVE-2023-21532
CVE-2023-21550
CVE-2023-21676
CVE-2023-21758
CVE-2023-21563
CVE-2023-21527
CVE-2023-21772
CVE-2023-21754
CVE-2023-21728
CVE-2023-21679
CVE-2023-21746
CVE-2023-21749
CVE-2023-21732
CVE-2023-21535
CVE-2023-21536
CVE-2023-21774
CVE-2023-21724
CVE-2023-21556
CVE-2023-21559
CVE-2023-21549
CVE-2023-21552
CVE-2023-21683
CVE-2023-21560
CVE-2023-21557
CVE-2023-21759
CVE-2023-21739
CVE-2023-21753
CVE-2023-21680
CVE-2023-21773
CVE-2023-21558
CVE-2023-21681
CVE-2023-21771
CVE-2023-21546
CVE-2023-21765
CVE-2023-21525
CVE-2023-21767
CVE-2023-21674
CVE-2023-21537
CVE-2023-21675
CVE-2023-21760
CVE-2023-21750
CVE-2023-21551
CVE-2023-21548
CVE-2023-21752
CVE-2023-21542
CVE-2023-21733
CVE-2023-21543
CVE-2023-21776
CVE-2023-21726
CVE-2023-21677
CVE-2023-21541
CVE-2023-21561
CVE-2023-21747
CVE-2023-21748
CVE-2023-21539
CVE-2023-21524
CVE-2023-21678
CVE-2023-21768
CVE-2023-21547
CVE-2023-21755
CVE-2023-21540
CVE-2023-21682

Impacts:

ACE

Related products:

Microsoft Windows

CVE-IDS:

CVE-2023-217577.5Critical
CVE-2023-217307.8Critical
CVE-2023-217664.7Warning
CVE-2023-215558.1Critical
CVE-2023-215327.0High
CVE-2023-215505.5High
CVE-2023-216768.8Critical
CVE-2023-217587.5Critical
CVE-2023-215636.8High
CVE-2023-215277.5Critical
CVE-2023-217727.8Critical
CVE-2023-217547.8Critical
CVE-2023-217287.5Critical
CVE-2023-216798.1Critical
CVE-2023-217467.8Critical
CVE-2023-217497.8Critical
CVE-2023-217328.8Critical
CVE-2023-215358.1Critical
CVE-2023-215364.7Warning
CVE-2023-217747.8Critical
CVE-2023-217247.8Critical
CVE-2023-215568.1Critical
CVE-2023-215595.5High
CVE-2023-215498.8Critical
CVE-2023-215527.8Critical
CVE-2023-216837.5Critical
CVE-2023-215606.6High
CVE-2023-215577.5Critical
CVE-2023-217593.3Warning
CVE-2023-217397.0High
CVE-2023-217535.5High
CVE-2023-216807.8Critical
CVE-2023-217737.8Critical
CVE-2023-215587.8Critical
CVE-2023-216818.8Critical
CVE-2023-217717.0High
CVE-2023-215468.1Critical
CVE-2023-217657.8Critical
CVE-2023-215255.3High
CVE-2023-217677.8Critical
CVE-2023-216748.8Critical
CVE-2023-215377.8Critical
CVE-2023-216757.8Critical
CVE-2023-217607.1High
CVE-2023-217507.1High
CVE-2023-215517.8Critical
CVE-2023-215488.1Critical
CVE-2023-217527.1High
CVE-2023-215427.0High
CVE-2023-217337.0High
CVE-2023-215438.1Critical
CVE-2023-217765.5High
CVE-2023-217267.8Critical
CVE-2023-216777.5Critical
CVE-2023-215417.8Critical
CVE-2023-215617.8Critical
CVE-2023-217477.8Critical
CVE-2023-217487.8Critical
CVE-2023-215397.5Critical
CVE-2023-215247.8Critical
CVE-2023-216787.8Critical
CVE-2023-217687.8Critical
CVE-2023-215477.5Critical
CVE-2023-217557.8Critical
CVE-2023-215405.5High
CVE-2023-216825.3High

KB list:

5022348
5022287
5022291
5022286
5022297
5022352
5022303
5022343
5022346
5022289
5022282

Microsoft official advisories:

References

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

8.8 High

AI Score

Confidence

Low

6.8 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

0.113 Low

EPSS

Percentile

95.1%