CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:C/I:C/A:C
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
AI Score
Confidence
Low
EPSS
Percentile
100.0%
This host is missing a critical security
update according to Microsoft KB4022725
# SPDX-FileCopyrightText: 2017 Greenbone AG
# Some text descriptions might be excerpted from (a) referenced
# source(s), and are Copyright (C) by the respective right holder(s).
#
# SPDX-License-Identifier: GPL-2.0-only
if(description)
{
script_oid("1.3.6.1.4.1.25623.1.0.811167");
script_version("2023-07-14T16:09:27+0000");
script_xref(name:"CISA", value:"Known Exploited Vulnerability (KEV) catalog");
script_xref(name:"URL", value:"https://www.cisa.gov/known-exploited-vulnerabilities-catalog");
script_cve_id("CVE-2017-8474", "CVE-2017-8524", "CVE-2017-8527", "CVE-2017-8475",
"CVE-2017-8476", "CVE-2017-8529", "CVE-2017-8530", "CVE-2017-0282",
"CVE-2017-0283", "CVE-2017-8477", "CVE-2017-8478", "CVE-2017-8531",
"CVE-2017-8532", "CVE-2017-0285", "CVE-2017-8479", "CVE-2017-8480",
"CVE-2017-8533", "CVE-2017-8543", "CVE-2017-0287", "CVE-2017-0288",
"CVE-2017-8481", "CVE-2017-8482", "CVE-2017-8544", "CVE-2017-8547",
"CVE-2017-8548", "CVE-2017-8549", "CVE-2017-0289", "CVE-2017-0291",
"CVE-2017-8483", "CVE-2017-8484", "CVE-2017-8555", "CVE-2017-0292",
"CVE-2017-0294", "CVE-2017-0295", "CVE-2017-8485", "CVE-2017-8489",
"CVE-2017-0296", "CVE-2017-0297", "CVE-2017-0298", "CVE-2017-8490",
"CVE-2017-8491", "CVE-2017-0299", "CVE-2017-0300", "CVE-2017-8492",
"CVE-2017-8493", "CVE-2017-8498", "CVE-2017-8499", "CVE-2017-8504",
"CVE-2017-8460", "CVE-2017-8462", "CVE-2017-8470", "CVE-2017-8471",
"CVE-2017-8520", "CVE-2017-8521", "CVE-2017-8522", "CVE-2017-8523",
"CVE-2017-8464", "CVE-2017-8465", "CVE-2017-8515", "CVE-2017-8517",
"CVE-2017-8554", "CVE-2017-8575", "CVE-2017-8518");
script_tag(name:"cvss_base", value:"10.0");
script_tag(name:"cvss_base_vector", value:"AV:N/AC:L/Au:N/C:C/I:C/A:C");
script_tag(name:"last_modification", value:"2023-07-14 16:09:27 +0000 (Fri, 14 Jul 2023)");
script_tag(name:"severity_vector", value:"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H");
script_tag(name:"severity_origin", value:"NVD");
script_tag(name:"severity_date", value:"2019-10-03 00:03:00 +0000 (Thu, 03 Oct 2019)");
script_tag(name:"creation_date", value:"2017-06-14 13:30:05 +0530 (Wed, 14 Jun 2017)");
script_name("Microsoft Windows Multiple Vulnerabilities (KB4022725)");
script_tag(name:"summary", value:"This host is missing a critical security
update according to Microsoft KB4022725");
script_tag(name:"vuldetect", value:"Checks if a vulnerable version is present on the target host.");
script_tag(name:"insight", value:"Multiple flaws exist due to:
- The error with slow firewall operations that sometimes results in
timeouts of Surface Hub's cleanup operation.
- An issue with a race condition that prevents Cortana cross-device
notification reply from working. Users will not be able to use the
remote toast activation feature set.
- An issue with the Privacy Separator feature of a Wireless Access Point
does not block communication between wireless devices on local subnets.
- Microsoft Edge improperly accesses objects in memory.");
script_tag(name:"impact", value:"Successful exploitation will allow
attackers to execute arbitrary code in the context of the current user,
gain the same user rights as the current user and to take control of
an affected system.");
script_tag(name:"affected", value:"- Microsoft Windows 10 Version 1703 x32/x64
- Microsoft Windows Server 2016");
script_tag(name:"solution", value:"The vendor has released updates. Please see the references for more information.");
script_tag(name:"solution_type", value:"VendorFix");
script_tag(name:"qod_type", value:"executable_version");
script_xref(name:"URL", value:"https://support.microsoft.com/en-us/help/4022725");
script_xref(name:"URL", value:"http://www.securityfocus.com/bid/98902");
script_xref(name:"URL", value:"http://www.securityfocus.com/bid/98930");
script_xref(name:"URL", value:"http://www.securityfocus.com/bid/98933");
script_xref(name:"URL", value:"http://www.securityfocus.com/bid/98853");
script_xref(name:"URL", value:"http://www.securityfocus.com/bid/98903");
script_xref(name:"URL", value:"http://www.securityfocus.com/bid/98953");
script_xref(name:"URL", value:"http://www.securityfocus.com/bid/98863");
script_xref(name:"URL", value:"http://www.securityfocus.com/bid/98885");
script_xref(name:"URL", value:"http://www.securityfocus.com/bid/98920");
script_xref(name:"URL", value:"http://www.securityfocus.com/bid/98854");
script_xref(name:"URL", value:"http://www.securityfocus.com/bid/98845");
script_xref(name:"URL", value:"http://www.securityfocus.com/bid/98819");
script_xref(name:"URL", value:"http://www.securityfocus.com/bid/98820");
script_xref(name:"URL", value:"http://www.securityfocus.com/bid/98914");
script_xref(name:"URL", value:"http://www.securityfocus.com/bid/98856");
script_xref(name:"URL", value:"http://www.securityfocus.com/bid/98857");
script_xref(name:"URL", value:"http://www.securityfocus.com/bid/98821");
script_xref(name:"URL", value:"http://www.securityfocus.com/bid/98824");
script_xref(name:"URL", value:"http://www.securityfocus.com/bid/98922");
script_xref(name:"URL", value:"http://www.securityfocus.com/bid/98923");
script_xref(name:"URL", value:"http://www.securityfocus.com/bid/98862");
script_xref(name:"URL", value:"http://www.securityfocus.com/bid/98858");
script_xref(name:"URL", value:"http://www.securityfocus.com/bid/98826");
script_xref(name:"URL", value:"http://www.securityfocus.com/bid/98932");
script_xref(name:"URL", value:"http://www.securityfocus.com/bid/98954");
script_xref(name:"URL", value:"http://www.securityfocus.com/bid/98955");
script_xref(name:"URL", value:"http://www.securityfocus.com/bid/98929");
script_xref(name:"URL", value:"http://www.securityfocus.com/bid/98835");
script_xref(name:"URL", value:"http://www.securityfocus.com/bid/98859");
script_xref(name:"URL", value:"http://www.securityfocus.com/bid/98847");
script_xref(name:"URL", value:"http://www.securityfocus.com/bid/98956");
script_xref(name:"URL", value:"http://www.securityfocus.com/bid/98836");
script_xref(name:"URL", value:"http://www.securityfocus.com/bid/98837");
script_xref(name:"URL", value:"http://www.securityfocus.com/bid/98904");
script_xref(name:"URL", value:"http://www.securityfocus.com/bid/98860");
script_xref(name:"URL", value:"http://www.securityfocus.com/bid/98865");
script_xref(name:"URL", value:"http://www.securityfocus.com/bid/98839");
script_xref(name:"URL", value:"http://www.securityfocus.com/bid/98840");
script_xref(name:"URL", value:"http://www.securityfocus.com/bid/98867");
script_xref(name:"URL", value:"http://www.securityfocus.com/bid/98869");
script_xref(name:"URL", value:"http://www.securityfocus.com/bid/98884");
script_xref(name:"URL", value:"http://www.securityfocus.com/bid/98901");
script_xref(name:"URL", value:"http://www.securityfocus.com/bid/98870");
script_xref(name:"URL", value:"http://www.securityfocus.com/bid/98850");
script_xref(name:"URL", value:"http://www.securityfocus.com/bid/98886");
script_xref(name:"URL", value:"http://www.securityfocus.com/bid/98883");
script_xref(name:"URL", value:"http://www.securityfocus.com/bid/98892");
script_xref(name:"URL", value:"http://www.securityfocus.com/bid/98887");
script_xref(name:"URL", value:"http://www.securityfocus.com/bid/98900");
script_xref(name:"URL", value:"http://www.securityfocus.com/bid/98848");
script_xref(name:"URL", value:"http://www.securityfocus.com/bid/98849");
script_xref(name:"URL", value:"http://www.securityfocus.com/bid/98925");
script_xref(name:"URL", value:"http://www.securityfocus.com/bid/98926");
script_xref(name:"URL", value:"http://www.securityfocus.com/bid/98928");
script_xref(name:"URL", value:"http://www.securityfocus.com/bid/98818");
script_xref(name:"URL", value:"http://www.securityfocus.com/bid/98843");
script_xref(name:"URL", value:"http://www.securityfocus.com/bid/98833");
script_xref(name:"URL", value:"http://www.securityfocus.com/bid/98895");
script_category(ACT_GATHER_INFO);
script_copyright("Copyright (C) 2017 Greenbone AG");
script_family("Windows : Microsoft Bulletins");
script_dependencies("smb_reg_service_pack.nasl");
script_require_ports(139, 445);
script_mandatory_keys("SMB/WindowsVersion");
exit(0);
}
include("smb_nt.inc");
include("secpod_reg.inc");
include("version_func.inc");
include("secpod_smb_func.inc");
if(hotfix_check_sp(win10:1, win10x64:1, win2016:1) <= 0){
exit(0);
}
sysPath = smb_get_system32root();
if(!sysPath ){
exit(0);
}
edgeVer = fetch_file_version(sysPath:sysPath, file_name:"Edgehtml.dll");
if(!edgeVer){
exit(0);
}
if(version_in_range(version:edgeVer, test_version:"11.0.15063.0", test_version2:"11.0.15063.412"))
{
report = 'File checked: ' + sysPath + "\Edgehtml.dll" + '\n' +
'File version: ' + edgeVer + '\n' +
'Vulnerable range: 11.0.15063.0 - 11.0.15063.412\n' ;
security_message(data:report);
exit(0);
}
exit(0);
www.securityfocus.com/bid/98818
www.securityfocus.com/bid/98819
www.securityfocus.com/bid/98820
www.securityfocus.com/bid/98821
www.securityfocus.com/bid/98824
www.securityfocus.com/bid/98826
www.securityfocus.com/bid/98833
www.securityfocus.com/bid/98835
www.securityfocus.com/bid/98836
www.securityfocus.com/bid/98837
www.securityfocus.com/bid/98839
www.securityfocus.com/bid/98840
www.securityfocus.com/bid/98843
www.securityfocus.com/bid/98845
www.securityfocus.com/bid/98847
www.securityfocus.com/bid/98848
www.securityfocus.com/bid/98849
www.securityfocus.com/bid/98850
www.securityfocus.com/bid/98853
www.securityfocus.com/bid/98854
www.securityfocus.com/bid/98856
www.securityfocus.com/bid/98857
www.securityfocus.com/bid/98858
www.securityfocus.com/bid/98859
www.securityfocus.com/bid/98860
www.securityfocus.com/bid/98862
www.securityfocus.com/bid/98863
www.securityfocus.com/bid/98865
www.securityfocus.com/bid/98867
www.securityfocus.com/bid/98869
www.securityfocus.com/bid/98870
www.securityfocus.com/bid/98883
www.securityfocus.com/bid/98884
www.securityfocus.com/bid/98885
www.securityfocus.com/bid/98886
www.securityfocus.com/bid/98887
www.securityfocus.com/bid/98892
www.securityfocus.com/bid/98895
www.securityfocus.com/bid/98900
www.securityfocus.com/bid/98901
www.securityfocus.com/bid/98902
www.securityfocus.com/bid/98903
www.securityfocus.com/bid/98904
www.securityfocus.com/bid/98914
www.securityfocus.com/bid/98920
www.securityfocus.com/bid/98922
www.securityfocus.com/bid/98923
www.securityfocus.com/bid/98925
www.securityfocus.com/bid/98926
www.securityfocus.com/bid/98928
www.securityfocus.com/bid/98929
www.securityfocus.com/bid/98930
www.securityfocus.com/bid/98932
www.securityfocus.com/bid/98933
www.securityfocus.com/bid/98953
www.securityfocus.com/bid/98954
www.securityfocus.com/bid/98955
www.securityfocus.com/bid/98956
support.microsoft.com/en-us/help/4022725
www.cisa.gov/known-exploited-vulnerabilities-catalog
Known Exploited Vulnerability (KEV) catalog
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:C/I:C/A:C
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
AI Score
Confidence
Low
EPSS
Percentile
100.0%