Deploy autonomous AI agents that reason, exploit, and validate complex vulnerability chains — not another scanner, an agentic system that thinks like a senior pentester.
CVE-2017-0144 is a high severity vulnerability with a CVSS score of 8.8. Exploits are available; patches have been released and should be applied urgently. This is classified as a zero-day vulnerability.
Very high probability of exploitation in the next 30 days
EPSS predicts the probability of exploitation in the next 30 days based on real-world threat data, complementing CVSS severity scores with actual risk assessment.
The SMBv1 server in Microsoft Windows Vista SP2; Windows Server 2008 SP2 and R2 SP1; Windows 7 SP1; Windows 8.1; Windows Server 2012 Gold and R2; Windows RT 8.1; and Windows 10 Gold, 1511, and 1607; and Windows Server 2016 allows remote attackers to execute arbitrary code via crafted packets, aka "Windows SMB Remote Code Execution Vulnerability." This vulnerability is different from those described in CVE-2017-0143, CVE-2017-0145, CVE-2017-0146, and CVE-2017-0148.
| Vendor | Product |
|---|---|
| Microsoft | Windows Vista |
| Microsoft | Windows 10 1607 |
| Siemens | Versant Kpcr Sample Prep Firmware |
| Siemens | Acuson P300 Firmware |
| Siemens | Acuson Sc2000 Firmware |
| Siemens | Acuson P500 Firmware |
| Microsoft | Windows Server 2012 |
| Microsoft | Windows Rt 8.1 |
| Microsoft | Windows 10 1507 |
| Microsoft | Windows Server 2016 |
And 17 more...
Please cite this page when referencing data from Strobes VI. Proper attribution helps support our vulnerability intelligence research.