CVE-2017-0143
HIGH KEV RANSOMWAREMicrosoft Server Message Block < 4.0e - Remote Code Execution
Title source: ruleDescription
The SMBv1 server in Microsoft Windows Vista SP2; Windows Server 2008 SP2 and R2 SP1; Windows 7 SP1; Windows 8.1; Windows Server 2012 Gold and R2; Windows RT 8.1; and Windows 10 Gold, 1511, and 1607; and Windows Server 2016 allows remote attackers to execute arbitrary code via crafted packets, aka "Windows SMB Remote Code Execution Vulnerability." This vulnerability is different from those described in CVE-2017-0144, CVE-2017-0145, CVE-2017-0146, and CVE-2017-0148.
Exploits (20)
nomisec
WORKING POC
38 stars
by h3x0v3rl0rd · poc
https://github.com/h3x0v3rl0rd/MS17-010_CVE-2017-0143
github
34 stars
by DarkFunct · cpoc
https://github.com/DarkFunct/CVE_Exploits/tree/main/CVE-2017-0143
nomisec
SCANNER
7 stars
by NatteeSetobol · poc
https://github.com/NatteeSetobol/Etern-blue-Windows-7-Checker
metasploit
SCANNER
https://github.com/rapid7/metasploit-framework/blob/master/modules/auxiliary/scanner/smb/smb_ms17_010.rb
exploitdb
WORKING POC
VERIFIED
by Metasploit · rubyremotewindows
https://www.exploit-db.com/exploits/43970
exploitdb
WORKING POC
by Juan Sacco · pythonremotewindows_x86-64
https://www.exploit-db.com/exploits/41987
exploitdb
SCANNER
VERIFIED
by Sean Dillon · rubydoswindows
https://www.exploit-db.com/exploits/41891
metasploit
WORKING POC
NORMAL
by sleepya, zerosum0x0, Shadow Brokers, Equation Group · rubypocwin
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/windows/smb/ms17_010_psexec.rb
metasploit
WORKING POC
by sleepya, zerosum0x0, Shadow Brokers, Equation Group · rubypoc
https://github.com/rapid7/metasploit-framework/blob/master/modules/auxiliary/admin/smb/ms17_010_command.rb
References (12)
Scores
CVSS v3
8.8
EPSS
0.9402
EPSS Percentile
99.9%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Exploitation Intel
CISA KEV
2021-11-03
VulnCheck KEV
2017-03-14
InTheWild.io
2017-03-14
ENISA EUVD
EUVD-2017-0510
Ransomware Use
Confirmed
Classification
Status
draft
Affected Products (18)
microsoft/server_message_block
philips/intellispace_portal
philips/intellispace_portal
siemens/acuson_p300_firmware
siemens/acuson_p300_firmware
siemens/acuson_p300_firmware
siemens/acuson_p300_firmware
siemens/acuson_p500_firmware
siemens/acuson_p500_firmware
siemens/acuson_sc2000_firmware
< 4.0e
siemens/acuson_sc2000_firmware
siemens/acuson_x700_firmware
siemens/acuson_x700_firmware
siemens/syngo_sc2000_firmware
< 4.0e
siemens/syngo_sc2000_firmware
... and 3 more
Timeline
Published
Mar 17, 2017
KEV Added
Nov 03, 2021
Tracked Since
Feb 18, 2026