CVE-2017-0213

HIGH
2017-05-12 [email protected]
7.3
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
Attack Vector
Local
Attack Complexity
Low
Privileges Required
Low
User Interaction
Required
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High

Lifecycle Timeline

5
Analysis Generated
Mar 26, 2026 - 11:18 vuln.today
Added to CISA KEV
Oct 22, 2025 - 00:16 cisa
CISA KEV
PoC Detected
Oct 22, 2025 - 00:16 vuln.today
Public exploit code
Patch Released
Oct 22, 2025 - 00:16 nvd
Patch available
CVE Published
May 12, 2017 - 14:29 nvd
HIGH 7.3

Description

Windows COM Aggregate Marshaler in Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016 allows an elevation privilege vulnerability when an attacker runs a specially crafted application, aka "Windows COM Elevation of Privilege Vulnerability". This CVE ID is unique from CVE-2017-0214.

Analysis

Windows COM Aggregate Marshaler allows local privilege escalation through improper handling of COM object creation, with public exploit code making this a common tool for red teams and adversaries.

Technical Context

The vulnerability in Windows COM's aggregate marshaler allows an attacker to exploit improper COM object initialization to execute code in a higher-privilege context. The publicly available exploit makes this accessible for post-exploitation privilege escalation.

Affected Products

['Microsoft Windows 7 SP1 through Windows 10 1703', 'Microsoft Windows Server 2008 R2 SP1 through Server 2016', 'Microsoft Windows RT 8.1']

Remediation

Apply Microsoft security update. Enforce least privilege for user accounts. Deploy application whitelisting to prevent execution of exploit tools.

Priority Score

66
Low Medium High Critical
KEV: +50
EPSS: +92.7
CVSS: +36
POC: +20

Share

CVE-2017-0213 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy