7.8 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
8.5 High
AI Score
Confidence
High
9.3 High
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:C/I:C/A:C
0.736 High
EPSS
Percentile
98.1%
08/09/2016
Critical
Multiple vulnerabilities were found in Microsoft Products (Extended Support Update). Malicious users can exploit these vulnerabilities to gain privileges, obtain sensitive information, execute arbitrary code, bypass security restrictions.
Public exploits exist for this vulnerability.
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation)
Windows 10 for 32-bit Systems
Windows Vista x64 Edition Service Pack 2
Internet Explorer 9
Windows 10 for x64-based Systems
Windows Server 2012 (Server Core installation)
Windows 7 for x64-based Systems Service Pack 1
Windows 8.1 for 32-bit systems
Windows Server 2008 for 32-bit Systems Service Pack 2
Windows 8.1 for x64-based systems
Windows Server 2012
Microsoft Office 2010 Service Pack 2 (32-bit editions)
Skype for Business 2016 (64-bit)
Windows Vista Service Pack 2
Internet Explorer 11
Microsoft Office 2010 Service Pack 2 (64-bit editions)
Microsoft Lync 2013 Service Pack 1 (64-bit)
Windows Server 2008 for x64-based Systems Service Pack 2
Microsoft Lync Basic 2013 Service Pack 1 (64-bit)
Microsoft Lync 2010 Attendee (admin level install)
Skype for Business 2016 Basic (32-bit)
Windows RT 8.1
Windows Server 2008 for Itanium-Based Systems Service Pack 2
Skype for Business 2016 (32-bit)
Microsoft Lync 2010 Attendee (user level install)
Windows Server 2012 R2 (Server Core installation)
Windows Server 2008 R2 for Itanium-Based Systems Service Pack 1
Windows 10 Version 1511 for 32-bit Systems
Microsoft Lync 2010 (64-bit)
Microsoft Office Word Viewer
Microsoft Live Meeting 2007 Console
Microsoft Edge (EdgeHTML-based)
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)
Microsoft Office 2007 Service Pack 3
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation)
Windows 10 Version 1511 for x64-based Systems
Skype for Business 2016 Basic (64-bit)
Microsoft Lync Basic 2013 Service Pack 1 (32-bit)
Windows 10 Version 1607 for 32-bit Systems
Windows 10 Version 1607 for x64-based Systems
Windows 7 for 32-bit Systems Service Pack 1
Windows Server 2008 R2 for x64-based Systems Service Pack 1
Internet Explorer 10
Microsoft Lync 2010 (32-bit)
Windows Server 2012 R2
Microsoft Lync 2013 Service Pack 1 (32-bit)
Install necessary updates from the KB section, that are listed in your Windows Update (Windows Update usually can be accessed from the Control Panel)
CVE-2016-3308
CVE-2016-3309
CVE-2016-3329
CVE-2016-3301
CVE-2016-3303
CVE-2016-3304
CVE-2016-3311
CVE-2016-3237
CVE-2016-3326
CVE-2016-3327
CVE-2016-3293
CVE-2016-3310
ACE
CVE-2016-32937.5Critical
CVE-2016-33295.3High
CVE-2016-33275.3High
CVE-2016-33265.3High
CVE-2016-33117.8Critical
CVE-2016-33107.8Critical
CVE-2016-33097.8Critical
CVE-2016-33087.8Critical
CVE-2016-33047.8Critical
CVE-2016-33037.8Critical
CVE-2016-33017.8Critical
CVE-2016-32377.5Critical
3177725
3178034
3175443
4021558
3185330
3192391
3167679
support.microsoft.com/kb/3167679
support.microsoft.com/kb/3175443
support.microsoft.com/kb/3177725
support.microsoft.com/kb/3178034
support.microsoft.com/kb/3185330
support.microsoft.com/kb/3192391
support.microsoft.com/kb/4021558
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3237
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3293
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3301
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3303
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3304
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3308
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3309
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3310
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3311
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3326
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3327
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3329
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2016-3237
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2016-3293
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2016-3301
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2016-3303
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2016-3304
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2016-3308
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2016-3309
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2016-3310
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2016-3311
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2016-3326
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2016-3327
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2016-3329
portal.msrc.microsoft.com/en-us/security-guidance
statistics.securelist.com/vulnerability-scan/month
threats.kaspersky.com/en/class/Exploit/
threats.kaspersky.com/en/product/Microsoft-Edge/
threats.kaspersky.com/en/product/Microsoft-Internet-Explorer/
threats.kaspersky.com/en/product/Microsoft-Lync-2010-Attendee/
threats.kaspersky.com/en/product/Microsoft-Lync/
threats.kaspersky.com/en/product/Microsoft-Office/
threats.kaspersky.com/en/product/Microsoft-Windows-10/
threats.kaspersky.com/en/product/Microsoft-Windows-7/
threats.kaspersky.com/en/product/Microsoft-Windows-8/
threats.kaspersky.com/en/product/Microsoft-Windows-Server-2008/
threats.kaspersky.com/en/product/Microsoft-Windows-Server-2012/
threats.kaspersky.com/en/product/Microsoft-Windows-Server/
threats.kaspersky.com/en/product/Microsoft-Windows-Vista-4/
threats.kaspersky.com/en/product/Microsoft-Windows/
threats.kaspersky.com/en/product/Microsoft-Word/
threats.kaspersky.com/en/product/Windows-RT/
7.8 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
8.5 High
AI Score
Confidence
High
9.3 High
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:C/I:C/A:C
0.736 High
EPSS
Percentile
98.1%