Vulnerability Details : CVE-2017-8464
Public exploit exists!
Windows Shell in Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, 1703, and Windows Server 2016 allows local users or remote attackers to execute arbitrary code via a crafted .LNK file, which is not properly handled during icon display in Windows Explorer or any other application that parses the icon of the shortcut. aka "LNK Remote Code Execution Vulnerability."
Vulnerability category: Execute code
CVE-2017-8464 is in the CISA Known Exploited Vulnerabilities Catalog
CISA vulnerability name:
Microsoft Windows Shell (.lnk) Remote Code Execution Vulnerability
CISA required action:
Apply updates per vendor instructions.
CISA description:
Windows Shell in multiple versions of Microsoft Windows allows local users or remote attackers to execute arbitrary code via a crafted .LNK file
Added on
2022-02-10
Action due date
2022-08-10
Exploit prediction scoring system (EPSS) score for CVE-2017-8464
Probability of exploitation activity in the next 30 days: 97.48%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 100 % EPSS Score History EPSS FAQ
Metasploit modules for CVE-2017-8464
-
LNK Code Execution Vulnerability
Disclosure Date: 2017-06-13First seen: 2020-04-26exploit/windows/local/cve_2017_8464_lnk_lpeThis module exploits a vulnerability in the handling of Windows Shortcut files (.LNK) that contain a dynamic icon, loaded from a malicious DLL. This vulnerability is a variant of MS15-020 (CVE-2015-0096). The created LNK file is similar except an additional -
LNK Code Execution Vulnerability
Disclosure Date: 2017-06-13First seen: 2020-04-26exploit/windows/fileformat/cve_2017_8464_lnk_rceThis module exploits a vulnerability in the handling of Windows Shortcut files (.LNK) that contain a dynamic icon, loaded from a malicious DLL. This vulnerability is a variant of MS15-020 (CVE-2015-0096). The created LNK file is similar except an additional
CVSS scores for CVE-2017-8464
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
9.3
|
HIGH | AV:N/AC:M/Au:N/C:C/I:C/A:C |
8.6
|
10.0
|
NIST |
8.8
|
HIGH | CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H |
2.8
|
5.9
|
NIST |
References for CVE-2017-8464
-
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8464
CVE-2017-8464 | LNK Remote Code Execution VulnerabilityPatch;Vendor Advisory
-
https://www.exploit-db.com/exploits/42382/
Microsoft Windows - '.LNK' Shortcut File Code Execution (Metasploit)Exploit;Third Party Advisory;VDB Entry
-
http://www.securityfocus.com/bid/98818
Microsoft Windows LNK CVE-2017-8464 Remote Code Execution VulnerabilityThird Party Advisory;VDB Entry
-
http://www.securitytracker.com/id/1038671
Windows Kernel Bugs Let Local Users Obtain Potentially Sensitive Information, Bypass Security, and Gain Elevated Privileges and Let Remote Users Execute Arbitrary Code - SecurityTrackerThird Party Advisory;VDB Entry
-
https://www.exploit-db.com/exploits/42429/
Microsoft Windows - '.LNK' Shortcut File Code ExecutionExploit;Third Party Advisory;VDB Entry
Products affected by CVE-2017-8464
- cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:itanium:*
- cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*
- cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_10:1511:*:*:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_10:1703:*:*:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*