vulnerability
Microsoft Windows: CVE-2017-0272: Windows SMB Remote Code Execution Vulnerability
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 9 | (AV:N/AC:M/Au:N/C:C/I:C/A:C) | May 9, 2017 | Jun 14, 2017 | Sep 5, 2025 |
Severity
9
CVSS
(AV:N/AC:M/Au:N/C:C/I:C/A:C)
Published
May 9, 2017
Added
Jun 14, 2017
Modified
Sep 5, 2025
Description
The Microsoft Server Message Block 1.0 (SMBv1) server on Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016 allows an attacker to execute remote code by the way it handles certain requests, aka "Windows SMB Remote Code Execution Vulnerability". This CVE ID is unique from CVE-2017-0277, CVE-2017-0278, and CVE-2017-0279.
Solutions
microsoft-windows-windows_10-1507-kb4019474microsoft-windows-windows_10-1511-kb4019473microsoft-windows-windows_10-1607-kb4019472microsoft-windows-windows_10-1703-kb4016871microsoft-windows-windows_server_2012-kb4019214microsoft-windows-windows_server_2012_r2-kb4019213microsoft-windows-windows_server_2016-1607-kb4019472msft-kb4018466-0ac43a1b-cec6-4b42-ad24-3c34a8e1f23bmsft-kb4018466-3b1535a8-4b05-4b14-8491-27afbaca7011msft-kb4018466-57d49b99-b074-451e-8d4f-c1c7575d7b5amsft-kb4018466-6cf11728-04ff-4916-9c93-36c0eea9ae55msft-kb4018466-8a608f23-2fdd-4a22-b1f9-098ed9b3e7cemsft-kb4018466-bb22d7aa-cc13-40b5-aed6-3d20e76cf08dmsft-kb4018466-bbee015f-c9ab-4f36-aad5-5642c4f04f2emsft-kb4018466-d45bc611-b980-4633-970e-21a0842c1871msft-kb4018466-d71f4cf7-ec1f-4d29-8a3e-20e7b23c0b9fmsft-kb4018466-d9ecfc51-5937-4dfd-b172-a12af99a2560msft-kb4018466-f3845008-7f2b-407f-9ed7-f66db87e7858msft-kb4019213-3041ea24-871e-44bd-ad52-9b2620ca82bcmsft-kb4019213-3329281f-2407-4bda-b8a6-37dc9b1ef179msft-kb4019214-6dbabc80-d41f-4736-ad08-5c172cb9c274msft-kb4019214-79e81c68-ba95-4c77-a747-5f2effd6388emsft-kb4019263-46c89aaa-6d7f-48c4-abda-2e0709b58b71msft-kb4019263-a1d1d5c2-78be-44c0-b0eb-2706f1225447msft-kb4019263-c218dbd8-9396-4978-a84d-aeb7a2c77ce3msft-kb4019263-c4749633-16b1-4395-b0bd-1930ee20d5c6msft-kb4019263-cd7fd4a7-f4db-493d-8cc3-70d33e708775msft-kb4019263-d8a880a2-6caa-453f-81c8-c6a88bf19d69msft-kb4019623-66e7ac5c-2105-48e6-9d3d-5813a7141723msft-kb4019623-d87d3f25-b844-4348-b732-a8985d58a73b
References
- BID-98260
- CVE-2017-0272
- https://attackerkb.com/topics/CVE-2017-0272
- https://support.microsoft.com/help/4016871
- https://support.microsoft.com/help/4019213
- https://support.microsoft.com/help/4019214
- https://support.microsoft.com/help/4019472
- https://support.microsoft.com/help/4019473
- https://support.microsoft.com/help/4019474
Rapid7 Labs
2026 Global Threat Landscape Report
The predictive window has collapsed. Exploitation follows disclosure in days. See how attackers are accelerating and how to stay ahead.