CVE-2017-0144

HIGH
2017-03-17 [email protected]
8.8
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High

Lifecycle Timeline

6
Analysis Generated
Mar 26, 2026 - 11:18 vuln.today
Added to CISA KEV
Oct 22, 2025 - 00:15 cisa
CISA KEV
EUVD Exploitation Confirmed
Oct 22, 2025 - 00:15 euvd
EUVD KEV
PoC Detected
Oct 22, 2025 - 00:15 vuln.today
Public exploit code
Patch Released
Oct 22, 2025 - 00:15 nvd
Patch available
CVE Published
Mar 17, 2017 - 00:59 nvd
HIGH 8.8

Description

The SMBv1 server in Microsoft Windows Vista SP2; Windows Server 2008 SP2 and R2 SP1; Windows 7 SP1; Windows 8.1; Windows Server 2012 Gold and R2; Windows RT 8.1; and Windows 10 Gold, 1511, and 1607; and Windows Server 2016 allows remote attackers to execute arbitrary code via crafted packets, aka "Windows SMB Remote Code Execution Vulnerability." This vulnerability is different from those described in CVE-2017-0143, CVE-2017-0145, CVE-2017-0146, and CVE-2017-0148.

Analysis

Windows SMBv1 server contains a remote code execution vulnerability known as 'EternalBlue' that was developed by the NSA, leaked by the Shadow Brokers, and weaponized by WannaCry and NotPetya, causing billions of dollars in global damage.

Technical Context

The vulnerability is a buffer overflow in the SMBv1 transaction handling code. When processing a crafted SMB_COM_TRANSACTION2 request, the srv.sys driver overflows a kernel pool allocation, allowing arbitrary code execution with SYSTEM privileges. No authentication is required; only network access to port 445.

Affected Products

['Microsoft Windows Vista SP2', 'Microsoft Windows 7 SP1', 'Microsoft Windows 8.1', 'Microsoft Windows 10 Gold/1511/1607', 'Microsoft Windows Server 2008/2012/2016', 'Microsoft Windows RT 8.1']

Remediation

Apply MS17-010 immediately. Disable SMBv1 entirely via Windows Features or Group Policy. Block port 445 at network perimeter. SMBv1 should be disabled on ALL systems; SMBv2/v3 provide all necessary functionality.

Priority Score

218
Low Medium High Critical
KEV: +50
EPSS: +94.3
CVSS: +44
POC: +20

Share

CVE-2017-0144 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy