CVE-2017-0199

HIGH KEV RANSOMWARE

Microsoft Office Word Malicious Hta Execution

Title source: metasploit

Description

Microsoft Office 2007 SP3, Microsoft Office 2010 SP2, Microsoft Office 2013 SP1, Microsoft Office 2016, Microsoft Windows Vista SP2, Windows Server 2008 SP2, Windows 7 SP1, Windows 8.1 allow remote attackers to execute arbitrary code via a crafted document, aka "Microsoft Office/WordPad Remote Code Execution Vulnerability w/Windows API."

Exploits (37)

exploitdb WORKING POC VERIFIED
by Metasploit · rubyremotewindows
https://www.exploit-db.com/exploits/41934
exploitdb WORKING POC
by Eduardo Braun Prado · textdoswindows
https://www.exploit-db.com/exploits/42995
exploitdb WORKING POC
by Bhadresh Patel · pythonremotewindows
https://www.exploit-db.com/exploits/41894
github WRITEUP 3,480 stars
by qazbnm456 · poc
https://github.com/qazbnm456/awesome-cve-poc/tree/master/CVE-2017-0199.md
nomisec WORKING POC 729 stars
by bhdresh · client-side
https://github.com/bhdresh/CVE-2017-0199
nomisec WORKING POC 16 stars
by haibara3839 · poc
https://github.com/haibara3839/CVE-2017-0199-master
github WRITEUP 14 stars
by xbl3 · poc
https://github.com/xbl3/awesome-cve-poc_qazbnm456/tree/master/CVE-2017-0199.md
nomisec WRITEUP 13 stars
by NotAwful · poc
https://github.com/NotAwful/CVE-2017-0199-Fix
nomisec SUSPICIOUS 12 stars
by SyFi · poc
https://github.com/SyFi/cve-2017-0199
nomisec WORKING POC 7 stars
by Exploit-install · client-side
https://github.com/Exploit-install/CVE-2017-0199
nomisec SCANNER 3 stars
by jacobsoo · poc
https://github.com/jacobsoo/RTF-Cleaner
nomisec SCANNER 3 stars
by nicpenning · poc
https://github.com/nicpenning/RTF-Cleaner
nomisec WRITEUP 2 stars
by Sunqiz · client-side
https://github.com/Sunqiz/CVE-2017-0199-reprofuction
github WORKING POC 2 stars
by dark-vex · pythonpoc
https://github.com/dark-vex/CVE-PoC-collection/tree/master/CVE-2017-0199
nomisec NO CODE 2 stars
by herbiezimmerman · poc
https://github.com/herbiezimmerman/2017-11-17-Maldoc-Using-CVE-2017-0199
nomisec WORKING POC 2 stars
by kn0wm4d · poc
https://github.com/kn0wm4d/htattack
nomisec WORKING POC 2 stars
by n1shant-sinha · client-side
https://github.com/n1shant-sinha/CVE-2017-0199
nomisec WORKING POC 2 stars
by mzakyz666 · client-side
https://github.com/mzakyz666/PoC-CVE-2017-0199
nomisec WRITEUP 1 stars
by ahmed-tarek22752 · poc
https://github.com/ahmed-tarek22752/RCE-CVE-2017-0199-detection-analysis
nomisec WRITEUP 1 stars
by BlueShield-CyberDefense · poc
https://github.com/BlueShield-CyberDefense/RCE-CVE-2017-0199-detection-analysis
nomisec WRITEUP 1 stars
by BlueShield-CyberDefense · poc
https://github.com/BlueShield-CyberDefense/Phishing-Analysis
nomisec WORKING POC 1 stars
by Phantomlancer123 · client-side
https://github.com/Phantomlancer123/CVE-2017-0199
nomisec WRITEUP
by BlackOclock · poc
https://github.com/BlackOclock/XLS-to-DBatLoader-or-GuLoader-for-AgentTesla-variant
gitlab WORKING POC
by The-Real-TechLord · poc
https://gitlab.com/The-Real-TechLord/CVE-2017-0199
nomisec WORKING POC
by kash-123 · client-side
https://github.com/kash-123/CVE-2017-0199
nomisec WORKING POC
by TheCyberWatchers · client-side
https://github.com/TheCyberWatchers/CVE-2017-0199-v5.0
nomisec WORKING POC
by BRAINIAC22 · client-side
https://github.com/BRAINIAC22/CVE-2017-0199
nomisec WORKING POC
by stealth-ronin · poc
https://github.com/stealth-ronin/CVE-2017-0199-PY-KIT
nomisec WORKING POC
by likekabin · poc
https://github.com/likekabin/CVE-2017-0199
nomisec STUB
by viethdgit · poc
https://github.com/viethdgit/CVE-2017-0199
nomisec WORKING POC
by sUbc0ol · client-side
https://github.com/sUbc0ol/Microsoft-Word-CVE-2017-0199-
nomisec STUB
by ryhanson · poc
https://github.com/ryhanson/CVE-2017-0199
metasploit WORKING POC EXCELLENT
by Haifei Li, ryHanson, wdormann, DidierStevens, vysec, Nixawk, sinn3r · rubypocwin
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/windows/fileformat/office_word_hta.rb
patchapalooza WORKING POC
by mirrors_bhdresh · poc
https://gitee.com/mirrors_bhdresh/CVE-2017-0199
patchapalooza WORKING POC
by Djangoat · remote
https://gitlab.com/Djangoat/cve-2017-0199-py-kit

Scores

CVSS v3 7.8
EPSS 0.9430
EPSS Percentile 99.9%
Attack Vector LOCAL
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

Details

CISA KEV 2021-11-03
VulnCheck KEV 2017-04-11
InTheWild.io 2017-04-11
ENISA EUVD EUVD-2017-0566
Ransomware Use Confirmed
Status published
Products (12)
microsoft/office 2007 sp3
microsoft/office 2010 sp2
microsoft/office 2013 sp1
microsoft/office 2016
microsoft/windows_7
microsoft/windows_server_2008
microsoft/windows_server_2008 r2 sp1
microsoft/windows_server_2012
microsoft/windows_vista
Microsoft Corporation/Office/WordPad Office 2007 SP3, Microsoft Office 2010 SP2, Microsoft Office 2013 SP1, Microsoft Office 2016, Micros
... and 2 more
Published Apr 12, 2017
KEV Added Nov 03, 2021
Tracked Since Feb 18, 2026