CVE-2017-0199

high

Description

Microsoft Office 2007 SP3, Microsoft Office 2010 SP2, Microsoft Office 2013 SP1, Microsoft Office 2016, Microsoft Windows Vista SP2, Windows Server 2008 SP2, Windows 7 SP1, Windows 8.1 allow remote attackers to execute arbitrary code via a crafted document, aka "Microsoft Office/WordPad Remote Code Execution Vulnerability w/Windows API."

References

https://www.mcafee.com/blogs/other-blogs/mcafee-labs/the-stealthy-stalker-remcos-rat/

https://securelist.com/exploits-and-vulnerabilities-q3-2024/114839/

https://www.infosecurity-magazine.com/news/smokeloader-malware-taiwan/

https://www.fortinet.com/blog/threat-research/sophisticated-attack-targets-taiwan-with-smokeloader

https://thehackernews.com/2024/11/cybercriminals-use-excel-exploit-to.html

https://securityaffairs.com/170791/security/a-new-fileless-variant-of-remcos-rat-phishing.html

https://thehackernews.com/2024/10/free-sniper-dz-phishing-tools-fuel.html

https://securityonline.info/fileless-remcos-rat-campaign-leverages-cve-2017-0199-flaw

https://securelist.com/vulnerability-exploit-report-q2-2024/113455/

https://thehackernews.com/2024/08/multi-stage-valleyrat-targets-chinese.html

https://www.securityweek.com/indian-apt-targeting-mediterranean-ports-and-maritime-facilities/

https://thehackernews.com/2024/06/china-linked-valleyrat-malware.html

https://securelist.com/vulnerability-report-q1-2024/112554/

https://www.tenable.com/blog/aa23-215a-2022s-top-routinely-exploited-vulnerabilities

https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-215a

https://www.tenable.com/blog/analyzing-the-vulnerabilities-associated-with-the-top-malware-strains-of-2021

https://www.cisa.gov/news-events/cybersecurity-advisories/aa22-117a

https://web.archive.org/web/20211025233339/https://twitter.com/pancak3lullz/status/1452679527197560837

https://www.cisa.gov/news-events/cybersecurity-advisories/aa19-339a

https://www.cisa.gov/news-events/cybersecurity-advisories/aa20-133a

https://www.mandiant.com/resources/blog/cve-2017-0199-hta-handler

https://www.mdsec.co.uk/2017/04/exploiting-cve-2017-0199-hta-handler-vulnerability/

https://www.fireeye.com/blog/threat-research/2017/04/cve-2017-0199_useda.html

https://www.exploit-db.com/exploits/42995/

https://www.exploit-db.com/exploits/41934/

https://www.exploit-db.com/exploits/41894/

https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0199

https://ics-cert.us-cert.gov/advisories/ICSMA-18-058-02

https://blog.nviso.be/2017/04/12/analysis-of-a-cve-2017-0199-malicious-rtf-document/

http://www.securitytracker.com/id/1038224

http://www.securityfocus.com/bid/97498

http://rewtin.blogspot.nl/2017/04/cve-2017-0199-practical-exploitation-poc.html

Details

Source: Mitre, NVD

Published: 2017-04-12

Updated: 2024-11-21

Risk Information

CVSS v2

Base Score: 9.3

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

Severity: High

CVSS v3

Base Score: 7.8

Vector: CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

Severity: High