CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
AI Score
Confidence
Low
EPSS
Percentile
96.1%
Multiple vulnerabilities were found in Microsoft Products (Extended Security Update). Malicious users can exploit these vulnerabilities to gain privileges, execute arbitrary code, cause denial of service, bypass security restrictions, spoof user interface, obtain sensitive information.
Below is a complete list of vulnerabilities:
Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.
CVE-2024-38250 critical
CVE-2024-43454 high
CVE-2024-38260 critical
CVE-2024-38247 critical
CVE-2024-38230 high
CVE-2024-38245 critical
CVE-2024-38231 high
CVE-2024-38014 critical
CVE-2024-43487 high
CVE-2024-43461 critical
CVE-2024-38236 critical
CVE-2024-38240 critical
CVE-2024-43475 high
CVE-2024-38239 high
CVE-2024-38263 critical
CVE-2024-30073 critical
CVE-2024-38256 high
CVE-2024-43455 critical
CVE-2024-38217 high
CVE-2024-38249 critical
CVE-2024-38258 high
CVE-2024-43467 critical
CVE-2024-38234 high
Install necessary updates from the KB section, that are listed in your Windows Update (Windows Update usually can be accessed from the Control Panel)
Arbitrary code execution. Exploitation of vulnerabilities with this impact can lead to executing by abuser any code or commands at vulnerable machine or process.
Obtain sensitive information. Exploitation of vulnerabilities with this impact can lead to capturing by abuser information, critical for user or system.
Denial of service. Exploitation of vulnerabilities with this impact can lead to loss of system availability or critical functional fault.
Security bypass. Exploitation of vulnerabilities with this impact can lead to performing actions restricted by current security settings.
Privilege escalation. Exploitation of vulnerabilities with this impact can lead to performing by abuser actions, which are normally disallowed for current role.
Spoof user interface. Exploitation of vulnerabilities with this impact can lead to changes in user interface to beguile user into inaccurate behavior.
support.microsoft.com/kb/5043049
support.microsoft.com/kb/5043087
support.microsoft.com/kb/5043092
support.microsoft.com/kb/5043125
support.microsoft.com/kb/5043129
support.microsoft.com/kb/5043135
support.microsoft.com/kb/5043138
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30073
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38014
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38217
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38230
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38231
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38234
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38236
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38239
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38240
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38245
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38247
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38249
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38250
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38256
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38258
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38260
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38263
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43454
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43455
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43461
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43467
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43475
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43487
statistics.securelist.com/
threats.kaspersky.com/en/class/Exploit/
threats.kaspersky.com/en/product/Microsoft-Windows-Server-2008/
threats.kaspersky.com/en/product/Microsoft-Windows-Server-2012/
threats.kaspersky.com/en/product/Microsoft-Windows-Server/
threats.kaspersky.com/en/product/Microsoft-Windows/