CISA KEV 정보
| 취약점명 | Microsoft Windows Server Message Block (SMBv1) Remote Code Execution Vulnerability |
|---|---|
| 설명 | Microsoft Windows Server Message Block 1.0 (SMBv1) contains an unspecified vulnerability that allows for remote code execution. |
| 조치사항 | Apply updates per vendor instructions. |
| 랜섬웨어 캠페인 악용 | Known |
| CWE | CWE-20 |
| 등록일 (KEV) | 2021-11-03 |
| 조치 기한 | 2022-05-03 |
| 추가 참고 | https://nvd.nist.gov/vuln/detail/CVE-2017-0143 |
NVD 상세 정보
CVSS v3.1: 8.8 HIGH
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HCVSS v2.0: 9.3
AV:N/AC:M/Au:N/C:C/I:C/A:C설명: The SMBv1 server in Microsoft Windows Vista SP2; Windows Server 2008 SP2 and R2 SP1; Windows 7 SP1; Windows 8.1; Windows Server 2012 Gold and R2; Windows RT 8.1; and Windows 10 Gold, 1511, and 1607; and Windows Server 2016 allows remote attackers to execute arbitrary code via crafted packets, aka "Windows SMB Remote Code Execution Vulnerability." This vulnerability is different from those described in CVE-2017-0144, CVE-2017-0145, CVE-2017-0146, and CVE-2017-0148.
참조
- http://packetstormsecurity.com/files/154690/DOUBLEPULSAR-Payload-Execution-Neutralization.html [Exploit, Third Party Advisory, VDB Entry]
- http://packetstormsecurity.com/files/156196/SMB-DOUBLEPULSAR-Remote-Code-Execution.html [Exploit, Third Party Advisory, VDB Entry]
- http://www.securityfocus.com/bid/96703 [Broken Link, Third Party Advisory, VDB Entry]
- http://www.securitytracker.com/id/1037991 [Broken Link, Third Party Advisory, VDB Entry]
- https://cert-portal.siemens.com/productcert/pdf/ssa-701903.pdf [Third Party Advisory]
- https://cert-portal.siemens.com/productcert/pdf/ssa-966341.pdf [Third Party Advisory]
- https://ics-cert.us-cert.gov/advisories/ICSMA-18-058-02 [Third Party Advisory, US Government Resource]
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0143 [Patch, Vendor Advisory]
- https://www.exploit-db.com/exploits/41891/ [Exploit, Third Party Advisory, VDB Entry]
- https://www.exploit-db.com/exploits/41987/ [Exploit, Third Party Advisory, VDB Entry]
- https://www.exploit-db.com/exploits/43970/ [Exploit, Third Party Advisory, VDB Entry]
- http://packetstormsecurity.com/files/154690/DOUBLEPULSAR-Payload-Execution-Neutralization.html [Exploit, Third Party Advisory, VDB Entry]
- http://packetstormsecurity.com/files/156196/SMB-DOUBLEPULSAR-Remote-Code-Execution.html [Exploit, Third Party Advisory, VDB Entry]
- http://www.securityfocus.com/bid/96703 [Broken Link, Third Party Advisory, VDB Entry]
- http://www.securitytracker.com/id/1037991 [Broken Link, Third Party Advisory, VDB Entry]
- ... 외 8건
This product uses the NVD API but is not endorsed or certified by the NVD.