CVE-2017-0022
MEDIUM KEVMicrosoft Xml Core Services - Memory Corruption
Title source: ruleDescription
Microsoft XML Core Services (MSXML) in Windows 10 Gold, 1511, and 1607; Windows 7 SP1; Windows 8.1; Windows RT 8.1; Windows Server 2008 SP2 and R2 SP1; Windows Server 2012 Gold and R2; Windows Server 2016; and Windows Vista SP2 improperly handles objects in memory, allowing attackers to test for files on disk via a crafted web site, aka "Microsoft XML Information Disclosure Vulnerability."
References (5)
Scores
CVSS v3
6.5
EPSS
0.4411
EPSS Percentile
97.5%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
Exploitation Intel
CISA KEV
2022-05-24
VulnCheck KEV
2017-03-14
InTheWild.io
2017-03-14
ENISA EUVD
EUVD-2017-0389
Classification
CWE
CWE-119
Status
published
Affected Products (6)
microsoft/xml_core_services
microsoft/windows_8.1
microsoft/windows_server_2008
microsoft/windows_server_2012
microsoft/windows_server_2012
Microsoft Corporation/XML Core Services
< XML Core Services (MSXML) in Windows 10 Gold, 1511, and 1607; Windows 7 SP1; Windows 8.1; Windows RT
Timeline
Published
Mar 17, 2017
KEV Added
May 24, 2022
Tracked Since
Feb 18, 2026