CVE-2017-0146
CVSS v3.1
8.8 (High)
CVSS v2.0
9.3 (High)
EPSS
96.27 % (100th)
Affected Products
27
Advisories
2
NVD Status
Analyzed
The SMBv1 server in Microsoft Windows Vista SP2; Windows Server 2008 SP2 and R2 SP1; Windows 7 SP1; Windows 8.1; Windows Server 2012 Gold and R2; Windows RT 8.1; and Windows 10 Gold, 1511, and 1607; and Windows Server 2016 allows remote attackers to execute arbitrary code via crafted packets, aka "Windows SMB Remote Code Execution Vulnerability." This vulnerability is different from those described in CVE-2017-0143, CVE-2017-0144, CVE-2017-0145, and CVE-2017-0148.
- CVE Status
- PUBLISHED
- NVD Status
- Analyzed
- CNA
- Microsoft Corporation
- Published Date
-
2017-03-17 00:59:04
(7 years ago) - Updated Date
-
2024-07-16 17:55:42
(2 months ago)
Microsoft Windows SMB Remote Code Execution Vulnerability (CISA - Known Exploited Vulnerabilities Catalog)
- Description
- The SMBv1 server in Microsoft Windows allows remote attackers to perform remote code execution.
- Required Action
- Apply updates per vendor instructions.
- Known to be Used in Ransomware Campaigns
- Known
- Notes
- https://nvd.nist.gov/vuln/detail/CVE-2017-0146
- Vendor
- Microsoft
- Product
- Windows
- In CISA Catalog from
-
2022-03-25
(2 years ago) - Due Date
-
2022-04-15
(2 years ago)
Affected Products
- Acuson P300
- Acuson P500
- Acuson Sc2000
- Acuson X700
- Syngo Sc2000
- Tissue Preparation System
- Versant Kpcr Molecular System
- Versant Kpcr Sample Prep
- Acuson P300 Firmware
- Acuson P500 Firmware
- Acuson Sc2000 Firmware
- Acuson X700 Firmware
- Syngo Sc2000 Firmware
- Tissue Preparation System Firmware
- Versant Kpcr Molecular System Firmware
- Versant Kpcr Sample Prep Firmware
Loading...
Loading...
Configuration #1
AND |
|
---|
Configuration #2
AND |
|
---|
Configuration #3
AND |
|
---|
Configuration #4
AND |
|
---|
Configuration #5
AND |
|
---|
Configuration #6
AND |
|
---|
Configuration #7
AND |
|
---|
Configuration #8
AND |
|
---|
Configuration #9
AND |
|
---|
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...