Unknown
CVE-2017-0146
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below:
Add References:
CVE-2017-0146
MITRE ATT&CK
Collection
Command and Control
Credential Access
Defense Evasion
Discovery
Execution
Exfiltration
Impact
Initial Access
Lateral Movement
Persistence
Privilege Escalation
Topic Tags
Description
The SMBv1 server in Microsoft Windows Vista SP2; Windows Server 2008 SP2 and R2 SP1; Windows 7 SP1; Windows 8.1; Windows Server 2012 Gold and R2; Windows RT 8.1; and Windows 10 Gold, 1511, and 1607; and Windows Server 2016 allows remote attackers to execute arbitrary code via crafted packets, aka “Windows SMB Remote Code Execution Vulnerability.” This vulnerability is different from those described in CVE-2017-0143, CVE-2017-0144, CVE-2017-0145, and CVE-2017-0148.
Add Assessment
No one has assessed this topic. Be the first to add your voice to the community.
CVSS V3 Severity and Metrics
General Information
Vendors
- microsoft,
- siemens
Products
- acuson p300 firmware 13.02,
- acuson p300 firmware 13.03,
- acuson p300 firmware 13.20,
- acuson p300 firmware 13.21,
- acuson p500 firmware va10,
- acuson p500 firmware vb10,
- acuson sc2000 firmware,
- acuson sc2000 firmware 5.0a,
- acuson x700 firmware 1.0,
- acuson x700 firmware 1.1,
- server message block 1.0,
- syngo sc2000 firmware,
- syngo sc2000 firmware 5.0a,
- tissue preparation system firmware,
- versant kpcr molecular system firmware,
- versant kpcr sample prep firmware
Metasploit Modules
Exploited in the Wild
Would you like to delete this Exploited in the Wild Report?
Yes, delete this reportWould you like to delete this Exploited in the Wild Report?
Yes, delete this reportReferences
Advisory
Additional Info
Technical Analysis
Report as Emergent Threat Response
Report as Exploited in the Wild
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below: