CVE-2017-11779
high-risk
Published 2017-10-13
The Microsoft Windows Domain Name System (DNS) DNSAPI.dll on Microsoft Windows 8.1, Windows Server 2012 R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016 allows a remote code execution vulnerability when it fails to properly handle DNS responses, aka "Windows DNSAPI Remote Code Execution Vulnerability".
Do I need to act?
!
38.3% chance of exploitation in next 30 days
EPSS score — higher than 62% of all CVEs
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
8
CVSS 8.1/10
High
NETWORK
/ HIGH complexity
Affected Products (8)
Affected Vendors
References (6)
Third Party Advisory
http://www.securityfocus.com/bid/101166
Third Party Advisory
http://www.securitytracker.com/id/1039533
Third Party Advisory
http://www.securityfocus.com/bid/101166
Third Party Advisory
http://www.securitytracker.com/id/1039533
55
/ 100
high-risk
Severity
24/34 · High
Exploitability
17/34 · Moderate
Exposure
14/34 · Moderate