The Windows Graphics component, which is responsible for the graphics on your Windows screen, hosts a font library which could be rigged with specially crafted embedded fonts. Due to the improper handling of Windows fonts library, there could be a remote code execution in which the attacker can gain full access to your system.
As per Microsoft's Security advisory, "there are multiple ways an attacker could exploit the vulnerability:
A denial of service vulnerability also exists in Windows Graphics; it could allow the attacker to cause a vulnerable system to stop responding. This flaw is due to improper handling of objects in memory.
Microsoft released a cumulative security update addressing all the critical remote code execution vulnerabilities in Windows Graphics Component. The CVE numbers are as below:
Reiterating, if you're a Windows user, irrespective of whether you use Windows 10 / 8.1 / RT 8.1 / 7, or Windows Servers 2008 / 2012 / 2016, you may still be at risk until you apply the latest patches from Microsoft's April patch release.
ManageEngine's Patch Management now allows you to easily apply the latest patches from its 'Critical Vulnerabilities' tab on the console. 38 patches are covered under 'Critical Vulnerabilities'.