CVE-2017-0143

HIGH KEV RANSOMWARE

Microsoft Server Message Block < 4.0e - Remote Code Execution

Title source: rule

Description

The SMBv1 server in Microsoft Windows Vista SP2; Windows Server 2008 SP2 and R2 SP1; Windows 7 SP1; Windows 8.1; Windows Server 2012 Gold and R2; Windows RT 8.1; and Windows 10 Gold, 1511, and 1607; and Windows Server 2016 allows remote attackers to execute arbitrary code via crafted packets, aka "Windows SMB Remote Code Execution Vulnerability." This vulnerability is different from those described in CVE-2017-0144, CVE-2017-0145, CVE-2017-0146, and CVE-2017-0148.

Exploits (21)

exploitdb WORKING POC VERIFIED
by Metasploit · rubyremotewindows
https://www.exploit-db.com/exploits/43970
exploitdb SCANNER VERIFIED
by Sean Dillon · rubydoswindows
https://www.exploit-db.com/exploits/41891
exploitdb WORKING POC
by Juan Sacco · pythonremotewindows_x86-64
https://www.exploit-db.com/exploits/41987
nomisec WORKING POC 38 stars
by h3x0v3rl0rd · poc
https://github.com/h3x0v3rl0rd/MS17-010_CVE-2017-0143
nomisec SCANNER 7 stars
by NatteeSetobol · poc
https://github.com/NatteeSetobol/Etern-blue-Windows-7-Checker
nomisec SCANNER 3 stars
by valarauco · poc
https://github.com/valarauco/wannafind
nomisec SCANNER
by hackingyseguridad · poc
https://github.com/hackingyseguridad/smb
nomisec WRITEUP
by benguelmas · poc
https://github.com/benguelmas/cve-2017-0143
nomisec WRITEUP
by Cedric-Martz · poc
https://github.com/Cedric-Martz/EthernalBlue_report
nomisec WRITEUP
by Mafiosohack · poc
https://github.com/Mafiosohack/offensive-security-lab-1
nomisec WORKING POC
by h3x0v3rl0rd · poc
https://github.com/h3x0v3rl0rd/MS17-010
nomisec NO CODE
by SampatDhakal · poc
https://github.com/SampatDhakal/Metasploit-Attack-Report
metasploit WORKING POC GREAT
by Equation Group, Shadow Brokers, zerosum0x0, Luke Jennings, wvu, Jacob Robles · rubypocwin
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/windows/smb/smb_doublepulsar_rce.rb
metasploit SCANNER
by Sean Dillon <[email protected]>, Luke Jennings · rubypoc
https://github.com/rapid7/metasploit-framework/blob/master/modules/auxiliary/scanner/smb/smb_ms17_010.rb
exploitdb WORKING POC
rubyremotewindows
https://www.exploit-db.com/exploits/47456
metasploit WORKING POC
by sleepya, zerosum0x0, Shadow Brokers, Equation Group · rubypoc
https://github.com/rapid7/metasploit-framework/blob/master/modules/auxiliary/admin/smb/ms17_010_command.rb
metasploit WORKING POC NORMAL
by sleepya, zerosum0x0, Shadow Brokers, Equation Group · rubypocwin
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/windows/smb/ms17_010_psexec.rb
patchapalooza WORKING POC
by n3rdh4x0r · remote-auth
https://github.com/n3rdh4x0r/MS17-010
patchapalooza WRITEUP
by fanicia · remote
https://github.com/fanicia/security-notes
patchapalooza WRITEUP
by Ascotbe · remote
https://github.com/Ascotbe/Kernelhub

Scores

CVSS v3 8.8
EPSS 0.9402
EPSS Percentile 99.9%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Details

CISA KEV 2021-11-03
VulnCheck KEV 2017-03-14
InTheWild.io 2017-03-14
ENISA EUVD EUVD-2017-0510
Ransomware Use Confirmed
Status published
Products (19)
microsoft/server_message_block 1.0
Microsoft Corporation/Windows SMB The SMBv1 server in Microsoft Windows Vista SP2; Windows Server 2008 SP2 and R2 SP1; Windows 7 SP1
philips/intellispace_portal 7.0
philips/intellispace_portal 8.0
siemens/acuson_p300_firmware 13.02
siemens/acuson_p300_firmware 13.03
siemens/acuson_p300_firmware 13.20
siemens/acuson_p300_firmware 13.21
siemens/acuson_p500_firmware va10
siemens/acuson_p500_firmware vb10
... and 9 more
Published Mar 17, 2017
KEV Added Nov 03, 2021
Tracked Since Feb 18, 2026