CVE-2017-0022
high-risk
Published 2017-03-17
Microsoft XML Core Services (MSXML) in Windows 10 Gold, 1511, and 1607; Windows 7 SP1; Windows 8.1; Windows RT 8.1; Windows Server 2008 SP2 and R2 SP1; Windows Server 2012 Gold and R2; Windows Server 2016; and Windows Vista SP2 improperly handles objects in memory, allowing attackers to test for files on disk via a crafted web site, aka "Microsoft XML Information Disclosure Vulnerability."
Do I need to act?
!
44.1% chance of exploitation in next 30 days
EPSS score — higher than 56% of all CVEs
!
CISA KEV: actively exploited in the wild
On the Known Exploited Vulnerabilities catalog — federal agencies must patch
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
6
CVSS 6.5/10
Medium
NETWORK
/ LOW complexity
Affected Products (5)
Affected Vendors
References (9)
Broken Link
http://www.securityfocus.com/bid/96069
Broken Link
http://www.securitytracker.com/id/1038014
Broken Link
http://www.securityfocus.com/bid/96069
Broken Link
http://www.securitytracker.com/id/1038014
60
/ 100
high-risk
Severity
24/34 · High
Exploitability
24/34 · High
Exposure
12/34 · Low