Vulnerability Name:

CVE-2017-0096 (CCN-122501)

Assigned:2016-09-09
Published:2017-03-14
Updated:2017-07-17
Summary:Hyper-V in Microsoft Windows Vista SP2; Windows Server 2008 SP2 and R2; Windows 7 SP1; Windows 8.1, Windows Server 2012 Gold and R2; Windows 10 Gold, 1511, and 1607; and Windows Server 2016 allows guest OS users to obtain sensitive information from host OS memory via a crafted application, aka "Hyper-V Information Disclosure Vulnerability."
CVSS v3 Severity:2.6 Low (CVSS v3.1 Vector: CVSS:3.1/AV:A/AC:H/PR:H/UI:N/S:C/C:L/I:N/A:N)
2.3 Low (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:A/AC:H/PR:H/UI:N/S:C/C:L/I:N/A:N/E:U/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Adjacent
Attack Complexity (AC): High
Privileges Required (PR): High
User Interaction (UI): None
Scope:Scope (S): Changed
Impact Metrics:Confidentiality (C): Low
Integrity (I): None
Availibility (A): None
6.8 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N)
5.9 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N/E:U/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Adjacent
Attack Complexity (AC): Low
Privileges Required (PR): Low
User Interaction (UI): None
Scope:Scope (S): Changed
Impact Metrics:Confidentiality (C): High
Integrity (I): None
Availibility (A): None
CVSS v2 Severity:2.3 Low (CVSS v2 Vector: AV:A/AC:M/Au:S/C:P/I:N/A:N)
Exploitability Metrics:Access Vector (AV): Adjacent_Network
Access Complexity (AC): Medium
Authentication (Au): Single_Instance
Impact Metrics:Confidentiality (C): Partial
Integrity (I): None
Availibility (A): None
5.5 Medium (CCN CVSS v2 Vector: AV:A/AC:L/Au:S/C:C/I:N/A:N)
Exploitability Metrics:Access Vector (AV): Adjacent_Network
Access Complexity (AC): Low
Athentication (Au): Single_Instance
Impact Metrics:Confidentiality (C): Complete
Integrity (I): None
Availibility (A): None
Vulnerability Type:CWE-200
Vulnerability Consequences:Obtain Information
References:Source: MITRE
Type: CNA
CVE-2017-0096

Source: CCN
Type: Microsoft Security Bulletin MS17-008
Security Update for Windows Hyper-V (4013082)

Source: CCN
Type: IBM Security Bulletin 2006696 (WebSphere Real Time)
Multiple vulnerabilities may affect IBM WebSphere Real Time

Source: CCN
Type: IBM Security Bulletin 2009253 (Notes)
Multiple Vulnerabilities in the IBM SDK Java Technology Edition affect IBM Notes

Source: BID
Type: Third Party Advisory, VDB Entry
96701

Source: CCN
Type: BID-96701
Microsoft Windows Hyper-V CVE-2017-0096 Information Disclosure Vulnerability

Source: SECTRACK
Type: UNKNOWN
1037999

Source: XF
Type: UNKNOWN
ms-hyperv-cve20170096-info-disc(122501)

Source: CONFIRM
Type: Mitigation, Patch, Vendor Advisory
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0096

Source: CCN
Type: IBM Security Bulletin 2006695 (Runtimes for Java Technology)
Multiple vulnerabilities may affect IBM SDK, Java Technology Edition

Vulnerable Configuration:Configuration 1:
  • cpe:/o:microsoft:windows_10:-:*:*:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_10:1511:*:*:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_10:1607:*:*:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_7:*:sp1:*:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_8.1:*:*:*:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_server_2008:*:sp2:*:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_server_2008:r2:*:*:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_vista:*:sp2:*:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/o:microsoft:windows_8.1:*:*:*:*:*:*:x64:*
  • OR cpe:/o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_10:*:*:*:*:*:*:x64:*
  • AND
  • cpe:/a:ibm:websphere_real_time:3.0:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:lotus_notes:8.5.3.6:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:lotus_notes:8.5:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:lotus_notes:8.5.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:lotus_notes:8.5.1.5:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:lotus_notes:8.5.2:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:lotus_notes:8.5.2.4:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:lotus_notes:8.5.3:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:lotus_notes:9.0.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:lotus_notes:9.0:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:lotus_notes:8.5.0.2:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:lotus_notes:9.0.1.9:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    BACK
    microsoft windows 10 -
    microsoft windows 10 1511
    microsoft windows 10 1607
    microsoft windows 7 * sp1
    microsoft windows 8.1 *
    microsoft windows server 2008 * sp2
    microsoft windows server 2008 r2
    microsoft windows server 2012 -
    microsoft windows server 2012 r2
    microsoft windows server 2016 *
    microsoft windows vista * sp2
    microsoft windows 8.1 *
    microsoft windows server 2012 r2
    microsoft windows 10 *
    ibm websphere real time 3.0
    ibm notes 8.5.3.6
    ibm notes 8.5
    ibm notes 8.5.1
    ibm notes 8.5.1.5
    ibm notes 8.5.2
    ibm notes 8.5.2.4
    ibm notes 8.5.3
    ibm notes 9.0.1
    ibm notes 9.0
    ibm notes 8.5.0.2
    ibm notes 9.0.1.9