CVE-2017-0022

MEDIUM KEV

Microsoft Xml Core Services - Memory Corruption

Title source: rule

Description

Microsoft XML Core Services (MSXML) in Windows 10 Gold, 1511, and 1607; Windows 7 SP1; Windows 8.1; Windows RT 8.1; Windows Server 2008 SP2 and R2 SP1; Windows Server 2012 Gold and R2; Windows Server 2016; and Windows Vista SP2 improperly handles objects in memory, allowing attackers to test for files on disk via a crafted web site, aka "Microsoft XML Information Disclosure Vulnerability."

Scores

CVSS v3 6.5
EPSS 0.4411
EPSS Percentile 97.5%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N

Exploitation Intel

CISA KEV 2022-05-24
VulnCheck KEV 2017-03-14
InTheWild.io 2017-03-14
ENISA EUVD EUVD-2017-0389

Classification

CWE
CWE-119
Status published

Affected Products (6)

microsoft/xml_core_services
microsoft/windows_8.1
microsoft/windows_server_2008
microsoft/windows_server_2012
microsoft/windows_server_2012
Microsoft Corporation/XML Core Services < XML Core Services (MSXML) in Windows 10 Gold, 1511, and 1607; Windows 7 SP1; Windows 8.1; Windows RT

Timeline

Published Mar 17, 2017
KEV Added May 24, 2022
Tracked Since Feb 18, 2026