Description
The SMBv1 server in Microsoft Windows Vista SP2; Windows Server 2008 SP2 and R2 SP1; Windows 7 SP1; Windows 8.1; Windows Server 2012 Gold and R2; Windows RT 8.1; and Windows 10 Gold, 1511, and 1607; and Windows Server 2016 allows remote attackers to execute arbitrary code via crafted packets, aka "Windows SMB Remote Code Execution Vulnerability." This vulnerability is different from those described in CVE-2017-0143, CVE-2017-0145, CVE-2017-0146, and CVE-2017-0148.
CVSS Metrics
- Vector
- CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
- Attack Vector
- network
- Complexity
- low
- Privileges
- low
- User Action
- none
- Scope
- unchanged
- Confidentiality
- high
- Integrity
- high
- Availability
- high
- Weaknesses
- NVD-CWE-noinfo
Metadata
- Primary Vendor
- MICROSOFT
- Published
- 3/17/2017
- Last Modified
- 10/22/2025
- Source
- NIST NVD
- Note: Verify all details with official vendor sources before applying patches.
Affected Products
microsoft : server_message_blocksiemens : acuson_p300_firmwaresiemens : acuson_p300_firmwaresiemens : acuson_p300_firmwaresiemens : acuson_p300_firmwaresiemens : acuson_p500_firmwaresiemens : acuson_p500_firmwaresiemens : acuson_sc2000_firmwaresiemens : acuson_sc2000_firmwaresiemens : acuson_x700_firmwaresiemens : acuson_x700_firmwaresiemens : syngo_sc2000_firmwaresiemens : syngo_sc2000_firmwaresiemens : tissue_preparation_system_firmwaresiemens : versant_kpcr_molecular_system_firmwaresiemens : versant_kpcr_sample_prep_firmware
AI-Powered Remediation
Generate remediation guidance or a C-suite brief for this vulnerability.