Rapid7 Vulnerability & Exploit Database

Microsoft CVE-2017-11782: Windows SMB Elevation of Privilege Vulnerability

Free InsightVM Trial No Credit Card Necessary
Watch Demo See how it all works
Back to Search

Microsoft CVE-2017-11782: Windows SMB Elevation of Privilege Vulnerability

Severity
5
CVSS
(AV:L/AC:L/Au:N/C:P/I:P/A:P)
Published
10/10/2017
Created
07/25/2018
Added
10/10/2017
Modified
11/18/2021

Description

An elevation of privilege vulnerability exists in the default Windows SMB Server configuration which allows anonymous users to remotely access certain named pipes that are also configured to allow anonymous access to users who are logged on locally. An unauthenticated attacker who successfully exploits this configuration error could remotely send specially crafted requests to certain services that accept requests via named pipes. To exploit the vulnerability, an attacker would have to be able to send SMB messages to an impacted Windows SMB Server for which the attacker does not already have valid credentials, and then identify an unpatched vulnerability in the handling of named pipe requests in one of the impacted services. The update addresses the vulnerability by correcting the Windows SMB Server default configuration.

Solution(s)

  • msft-kb4041691-27ba94ef-c1b7-4cd7-b091-7f818dee7983
  • msft-kb4041691-3f057cc9-5e08-431f-bbbe-32144c35e95e
  • msft-kb4041691-4006f198-f0ed-47b5-accc-284bdf382724

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;