CVE-2017-0148
HIGH KEV RANSOMWAREMicrosoft Server Message Block < 4.0e - Improper Input Validation
Title source: ruleDescription
The SMBv1 server in Microsoft Windows Vista SP2; Windows Server 2008 SP2 and R2 SP1; Windows 7 SP1; Windows 8.1; Windows Server 2012 Gold and R2; Windows RT 8.1; and Windows 10 Gold, 1511, and 1607; and Windows Server 2016 allows remote attackers to execute arbitrary code via crafted packets, aka "Windows SMB Remote Code Execution Vulnerability." This vulnerability is different from those described in CVE-2017-0143, CVE-2017-0144, CVE-2017-0145, and CVE-2017-0146.
Exploits (6)
exploitdb
WORKING POC
VERIFIED
by Metasploit · rubyremotewindows
https://www.exploit-db.com/exploits/47456
exploitdb
SCANNER
VERIFIED
by Sean Dillon · rubydoswindows
https://www.exploit-db.com/exploits/41891
exploitdb
WORKING POC
by Juan Sacco · pythonremotewindows_x86-64
https://www.exploit-db.com/exploits/41987
metasploit
WORKING POC
GREAT
by Equation Group, Shadow Brokers, zerosum0x0, Luke Jennings, wvu, Jacob Robles · rubypocwin
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/windows/smb/smb_doublepulsar_rce.rb
References (11)
Scores
CVSS v3
8.1
EPSS
0.9407
EPSS Percentile
99.9%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
Details
CISA KEV
2022-04-06
VulnCheck KEV
2017-04-25
InTheWild.io
2022-04-06
ENISA EUVD
EUVD-2017-0515
Ransomware Use
Confirmed
CWE
CWE-20
Status
published
Products (17)
microsoft/server_message_block
1.0
Microsoft Corporation/Windows SMB
The SMBv1 server in Microsoft Windows Vista SP2; Windows Server 2008 SP2 and R2 SP1; Windows 7 SP1
siemens/acuson_p300_firmware
13.02
siemens/acuson_p300_firmware
13.03
siemens/acuson_p300_firmware
13.20
siemens/acuson_p300_firmware
13.21
siemens/acuson_p500_firmware
va10
siemens/acuson_p500_firmware
vb10
siemens/acuson_sc2000_firmware
5.0a
siemens/acuson_sc2000_firmware
4.0 - 4.0e
... and 7 more
Published
Mar 17, 2017
KEV Added
Apr 06, 2022
Tracked Since
Feb 18, 2026