CVE-2017-0148

KEV
Published: Mar 17, 2017 Last Modified: Ott 22, 2025
ExploitDB:
Other exploit source:
Google Dorks:
HIGH 8,1
Attack Vector: network
Attack Complexity: high
Privileges Required: none
User Interaction: none
Scope: unchanged
Confidentiality: high
Integrity: high
Availability: high
HIGH 9,3
Access Vector: network
Access Complexity: medium
Authentication: none
Confidentiality: complete
Integrity: complete
Availability: complete

Description

AI Translation Available

The SMBv1 server in Microsoft Windows Vista SP2; Windows Server 2008 SP2 and R2 SP1; Windows 7 SP1; Windows 8.1; Windows Server 2012 Gold and R2; Windows RT 8.1; and Windows 10 Gold, 1511, and 1607; and Windows Server 2016 allows remote attackers to execute arbitrary code via crafted packets, aka 'Windows SMB Remote Code Execution Vulnerability.' This vulnerability is different from those described in CVE-2017-0143, CVE-2017-0144, CVE-2017-0145, and CVE-2017-0146.

EPSS (Exploit Prediction Scoring System)

Trend Analysis

EPSS (Exploit Prediction Scoring System)

Prevede la probabilità di sfruttamento basata su intelligence sulle minacce e sulle caratteristiche della vulnerabilità.

EPSS Score
0,9407
Percentile
1,0th
Updated

EPSS Score Trend (Last 90 Days)

20

Improper Input Validation

Stable
Common Consequences
Security Scopes Affected:
Availability Confidentiality Integrity
Potential Impacts:
Dos: Crash, Exit, Or Restart Dos: Resource Consumption (Cpu) Dos: Resource Consumption (Memory) Read Memory Read Files Or Directories Modify Memory Execute Unauthorized Code Or Commands
Applicable Platforms
All platforms may be affected
View CWE Details
Exploit

Microsoft Windows - SMB Remote Code Execution Scanner …

Verified Metasploit Framework (MSF)

Microsoft Windows - SMB Remote Code Execution Scanner (MS17-010) (Metasploit)

View Exploit Code →
Exploit

Microsoft Windows Server 2008 R2 (x64) - 'SrvOs2FeaToNt' …

Microsoft Windows Server 2008 R2 (x64) - 'SrvOs2FeaToNt' SMB Remote Code Execution (MS17-010)

View Exploit Code →
Exploit

DOUBLEPULSAR - Payload Execution and Neutralization (Metasploit)

Verified Remote

DOUBLEPULSAR - Payload Execution and Neutralization (Metasploit)

View Exploit Code →
Operating System

Acuson P300 Firmware by Siemens

cpe:2.3:o:siemens:acuson_p300_firmware:13.02:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Operating System

Syngo Sc2000 Firmware by Siemens

cpe:2.3:o:siemens:syngo_sc2000_firmware:5.0a:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Operating System

Acuson P300 Firmware by Siemens

cpe:2.3:o:siemens:acuson_p300_firmware:13.21:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Operating System

Syngo Sc2000 Firmware by Siemens

Version Range Affected
From 4.0 (inclusive)
To 4.0e (inclusive)
cpe:2.3:o:siemens:syngo_sc2000_firmware:*:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Operating System

Acuson P500 Firmware by Siemens

cpe:2.3:o:siemens:acuson_p500_firmware:vb10:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Operating System

Acuson X700 Firmware by Siemens

cpe:2.3:o:siemens:acuson_x700_firmware:1.1:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Operating System

Acuson P500 Firmware by Siemens

cpe:2.3:o:siemens:acuson_p500_firmware:va10:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Operating System

Versant Kpcr Molecular System Firmware by Siemens

cpe:2.3:o:siemens:versant_kpcr_molecular_system_firmware:*:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Operating System

Acuson P300 Firmware by Siemens

cpe:2.3:o:siemens:acuson_p300_firmware:13.20:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Operating System

Tissue Preparation System Firmware by Siemens

cpe:2.3:o:siemens:tissue_preparation_system_firmware:*:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Operating System

Acuson Sc2000 Firmware by Siemens

cpe:2.3:o:siemens:acuson_sc2000_firmware:5.0a:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Operating System

Acuson P300 Firmware by Siemens

cpe:2.3:o:siemens:acuson_p300_firmware:13.03:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Operating System

Versant Kpcr Sample Prep Firmware by Siemens

cpe:2.3:o:siemens:versant_kpcr_sample_prep_firmware:*:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Operating System

Acuson X700 Firmware by Siemens

cpe:2.3:o:siemens:acuson_x700_firmware:1.0:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Operating System

Acuson Sc2000 Firmware by Siemens

Version Range Affected
From 4.0 (inclusive)
To 4.0e (exclusive)
cpe:2.3:o:siemens:acuson_sc2000_firmware:*:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Application

Server Message Block by Microsoft

cpe:2.3:a:microsoft:server_message_block:1.0:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2017…
http://packetstormsecurity.com/files/154690/DOUBLEPULSAR-Payload-Execution-Neut…
http://packetstormsecurity.com/files/156196/SMB-DOUBLEPULSAR-Remote-Code-Execut…
https://cert-portal.siemens.com/productcert/pdf/ssa-701903.pdf
https://cert-portal.siemens.com/productcert/pdf/ssa-966341.pdf
https://ics-cert.us-cert.gov/advisories/ICSMA-18-058-02
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0148
https://www.exploit-db.com/exploits/41891/
https://www.exploit-db.com/exploits/41987/
http://www.securityfocus.com/bid/96706
http://www.securitytracker.com/id/1037991
http://packetstormsecurity.com/files/154690/DOUBLEPULSAR-Payload-Execution-Neut…
http://packetstormsecurity.com/files/156196/SMB-DOUBLEPULSAR-Remote-Code-Execut…
https://cert-portal.siemens.com/productcert/pdf/ssa-701903.pdf
https://cert-portal.siemens.com/productcert/pdf/ssa-966341.pdf
https://ics-cert.us-cert.gov/advisories/ICSMA-18-058-02
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0148
https://www.exploit-db.com/exploits/41891/
https://www.exploit-db.com/exploits/41987/
http://www.securityfocus.com/bid/96706
http://www.securitytracker.com/id/1037991