Vulnerability Details : CVE-2017-0144
Public exploit exists!
Used for ransomware!
The SMBv1 server in Microsoft Windows Vista SP2; Windows Server 2008 SP2 and R2 SP1; Windows 7 SP1; Windows 8.1; Windows Server 2012 Gold and R2; Windows RT 8.1; and Windows 10 Gold, 1511, and 1607; and Windows Server 2016 allows remote attackers to execute arbitrary code via crafted packets, aka "Windows SMB Remote Code Execution Vulnerability." This vulnerability is different from those described in CVE-2017-0143, CVE-2017-0145, CVE-2017-0146, and CVE-2017-0148.
Vulnerability category: Execute code
Products affected by CVE-2017-0144
- cpe:2.3:a:microsoft:server_message_block:1.0:*:*:*:*:*:*:*
- cpe:2.3:o:siemens:acuson_p300_firmware:13.02:*:*:*:*:*:*:*
- cpe:2.3:o:siemens:acuson_p300_firmware:13.03:*:*:*:*:*:*:*
- cpe:2.3:o:siemens:acuson_p300_firmware:13.20:*:*:*:*:*:*:*
- cpe:2.3:o:siemens:acuson_p300_firmware:13.21:*:*:*:*:*:*:*
- cpe:2.3:o:siemens:acuson_p500_firmware:va10:*:*:*:*:*:*:*
- cpe:2.3:o:siemens:acuson_p500_firmware:vb10:*:*:*:*:*:*:*
- cpe:2.3:o:siemens:acuson_sc2000_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:siemens:acuson_sc2000_firmware:5.0a:*:*:*:*:*:*:*
- cpe:2.3:o:siemens:acuson_x700_firmware:1.0:*:*:*:*:*:*:*
- cpe:2.3:o:siemens:acuson_x700_firmware:1.1:*:*:*:*:*:*:*
- cpe:2.3:o:siemens:syngo_sc2000_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:siemens:syngo_sc2000_firmware:5.0a:*:*:*:*:*:*:*
- cpe:2.3:o:siemens:tissue_preparation_system_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:siemens:versant_kpcr_molecular_system_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:siemens:versant_kpcr_sample_prep_firmware:*:*:*:*:*:*:*:*
CVE-2017-0144 is in the CISA Known Exploited Vulnerabilities Catalog
This issue is known to have been leveraged as part of a ransomware campaign.
CISA vulnerability name:
Microsoft SMBv1 Remote Code Execution Vulnerability
CISA required action:
Apply updates per vendor instructions.
CISA description:
The SMBv1 server in multiple Microsoft Windows versions allows remote attackers to execute arbitrary code via crafted packets.
Notes:
https://nvd.nist.gov/vuln/detail/CVE-2017-0144
Added on
2022-02-10
Action due date
2022-08-10
Exploit prediction scoring system (EPSS) score for CVE-2017-0144
96.30%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 100 %
Percentile, the proportion of vulnerabilities that are scored at or less
Metasploit modules for CVE-2017-0144
-
MS17-010 SMB RCE Detection
First seen: 2020-04-26auxiliary/scanner/smb/smb_ms17_010Uses information disclosure to determine if MS17-010 has been patched or not. Specifically, it connects to the IPC$ tree and attempts a transaction on FID 0. If the status returned is "STATUS_INSUFF_SERVER_RESOURCES", the machine does not have the MS17-010 patch. -
MS17-010 EternalBlue SMB Remote Windows Kernel Pool Corruption
Disclosure Date: 2017-03-14First seen: 2020-04-26exploit/windows/smb/ms17_010_eternalblueThis module is a port of the Equation Group ETERNALBLUE exploit, part of the FuzzBunch toolkit released by Shadow Brokers. There is a buffer overflow memmove operation in Srv!SrvOs2FeaToNt. The size is calculated in Srv!SrvOs2FeaListSizeToNt, with mathematic -
SMB DOUBLEPULSAR Remote Code Execution
Disclosure Date: 2017-04-14First seen: 2020-04-26exploit/windows/smb/smb_doublepulsar_rceThis module executes a Metasploit payload against the Equation Group's DOUBLEPULSAR implant for SMB as popularly deployed by ETERNALBLUE. While this module primarily performs code execution against the implant, the "Neutralize implant" target allows you to disable t -
MS17-010 EternalBlue SMB Remote Windows Kernel Pool Corruption for Win8+
Disclosure Date: 2017-03-14First seen: 2020-04-26exploit/windows/smb/ms17_010_eternalblue_win8exploit/windows/smb/ms17_010_eternalblue_win8 EternalBlue exploit for Windows 8, Windows 10, and 2012 by sleepya The exploit might FAIL and CRASH a target system (depended on what is overwritten) The exploit support only x64 target Tested on: - Windows 2012
CVSS scores for CVE-2017-0144
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
9.3
|
HIGH | AV:N/AC:M/Au:N/C:C/I:C/A:C |
8.6
|
10.0
|
NIST | |
8.1
|
HIGH | CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H |
2.2
|
5.9
|
NIST | |
8.8
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
2.8
|
5.9
|
NIST | 2024-07-24 |
References for CVE-2017-0144
-
http://packetstormsecurity.com/files/156196/SMB-DOUBLEPULSAR-Remote-Code-Execution.html
SMB DOUBLEPULSAR Remote Code Execution ≈ Packet StormExploit;Third Party Advisory;VDB Entry
-
https://www.exploit-db.com/exploits/42030/
Microsoft Windows 8/8.1/2012 R2 (x64) - 'EternalBlue' SMB Remote Code Execution (MS17-010)Exploit;Third Party Advisory;VDB Entry
-
https://ics-cert.us-cert.gov/advisories/ICSMA-18-058-02
Philips Intellispace Portal ISP Vulnerabilities | CISAThird Party Advisory;US Government Resource
-
http://packetstormsecurity.com/files/154690/DOUBLEPULSAR-Payload-Execution-Neutralization.html
DOUBLEPULSAR Payload Execution / Neutralization ≈ Packet StormExploit;Third Party Advisory;VDB Entry
-
https://www.exploit-db.com/exploits/42031/
Microsoft Windows 7/2008 R2 - 'EternalBlue' SMB Remote Code Execution (MS17-010)Exploit;Third Party Advisory;VDB Entry
-
http://www.securityfocus.com/bid/96704
Microsoft Windows SMB Server CVE-2017-0144 Remote Code Execution VulnerabilityBroken Link;Third Party Advisory;VDB Entry
-
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0144
CVE-2017-0144 | Windows SMB Remote Code Execution VulnerabilityPatch;Vendor Advisory
-
https://www.exploit-db.com/exploits/41987/
Microsoft Windows Server 2008 R2 (x64) - 'SrvOs2FeaToNt' SMB Remote Code Execution (MS17-010)Exploit;Third Party Advisory;VDB Entry
-
http://www.securitytracker.com/id/1037991
Windows Server Message Block Request Handling Flaws Let Remote Users Obtain Potentially Sensitive Information and Execute Arbitrary Code - SecurityTrackerBroken Link;Third Party Advisory;VDB Entry
-
https://cert-portal.siemens.com/productcert/pdf/ssa-966341.pdf
Third Party Advisory
-
https://cert-portal.siemens.com/productcert/pdf/ssa-701903.pdf
Third Party Advisory
-
https://www.exploit-db.com/exploits/41891/
Microsoft Windows - SMB Remote Code Execution Scanner (MS17-010) (Metasploit)Exploit;Third Party Advisory;VDB Entry
Jump to