CVE-2017-0143High KEVConfirmedExploit available
MSR
MSR
Microsoft Security Response Center
The Security Update Guide is the source of truth for vulnerabilities in Microsoft products — KB article numbers, impacted builds and replacement patches. MSRC also assigns the MSRC-specific exploitability index used alongside CVSS.
Region
US
Updates
Patch Tuesday + ad-hoc
License
Proprietary
Microsoft's Security Update Guide, covering Windows, Office, Azure, SQL Server, Exchange and other first-party products.
https://msrc.microsoft.com/update-guide →Share link
Anyone with the link can open this vulnerability.
The SMBv1 server in Microsoft Windows Vista SP2; Windows Server 2008 SP2 and R2 SP1; Windows 7 SP1; Windows 8.1; Windows Server 2012 Gold a…
CVSS
8.8
High
EPSS
0.94
p99
Published
2017-01-01
Updated
2021-11-03
Description
The SMBv1 server in Microsoft Windows Vista SP2; Windows Server 2008 SP2 and R2 SP1; Windows 7 SP1; Windows 8.1; Windows Server 2012 Gold and R2; Windows RT 8.1; and Windows 10 Gold, 1511, and 1607; and Windows Server 2016 allows remote attackers to execute arbitrary code via crafted packets, aka "Windows SMB Remote Code Execution Vulnerability." This vulnerability is different from those described in CVE-2017-0144, CVE-2017-0145, CVE-2017-0146, and CVE-2017-0148.
Tags · CWE
KEV
Affected products
Intellispace_portal
CVSS vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Timeline
2017-01-01
Published
2021-11-03
Added to KEV
2021-11-03
Updated
CVSS 3.1 breakdown
Attack Vector
AV: N
Network (N)
Attack Complexity
AC: L
Low (L)
Privileges Required
PR: L
Low (L)
User Interaction
UI: N
None (N)
Scope
S: U
Unchanged (U)
Confidentiality Impact
C: H
High (H)
Integrity Impact
I: H
High (H)
Availability Impact
A: H
High (H)
Exploit indicators
EPSS
0.940 · p99
Known exploited (KEV)
Yes
Known exploits — Сканер-ВС
41891
exploitdb · https://www.exploit-db.com/exploits/41891
41987
exploitdb · https://www.exploit-db.com/exploits/41987
43970
exploitdb · https://www.exploit-db.com/exploits/43970
47456
exploitdb · https://www.exploit-db.com/exploits/47456
CVE-2017-0143
github-poc · https://github.com/benguelmas/cve-2017-0143
Affected software
| Product | Vendor | Status |
|---|---|---|
| acuson_p300_firmware | * | Exploited |
| acuson_p500_firmware | * | Exploited |
| acuson_sc2000_firmware | * | Exploited |
| acuson_x700_firmware | * | Exploited |
| intellispace_portal | * | Exploited |
| server_message_block | * | Exploited |
| syngo_sc2000_firmware | * | Exploited |
| tissue_preparation_system_firmware | * | Exploited |
| versant_kpcr_molecular_system_firmware | * | Exploited |
| versant_kpcr_sample_prep_firmware | * | Exploited |
| Windows | Microsoft | Exploited |
| Windows | Microsoft | Exploited |
| Windows | Microsoft | Exploited |
| Windows | Microsoft | Exploited |
| Windows | Microsoft | Exploited |
| Windows | Microsoft | Exploited |
| Windows | Microsoft | Exploited |
| Windows | Microsoft | Exploited |
| Windows | Microsoft | Exploited |
| Windows | Microsoft | Exploited |
Source databases
MSR
MSR
Microsoft Security Response Center
The Security Update Guide is the source of truth for vulnerabilities in Microsoft products — KB article numbers, impacted builds and replacement patches. MSRC also assigns the MSRC-specific exploitability index used alongside CVSS.
Region
US
Updates
Patch Tuesday + ad-hoc
License
Proprietary
Microsoft's Security Update Guide, covering Windows, Office, Azure, SQL Server, Exchange and other first-party products.
https://msrc.microsoft.com/update-guide →CVE
CVE
National Vulnerability Database
NVD is the U.S. government repository of standards-based vulnerability management data, built on top of the MITRE CVE list. Every record includes CPE applicability statements, CVSS v2 and v3.x base scores, CWE mappings and cross-references to advisories.
Region
US
Updates
15 min
License
Public Domain
Comprehensive catalog of publicly disclosed vulnerabilities with CPE matches, CVSS scoring and reference URLs. De-facto standard for cross-vendor correlation.
https://nvd.nist.gov →Related vulnerabilities