CVE-2017-0022

ENISA EUVD: EUVD-2017-0389 ↗
Exploited in the Wild ✓ Confirmed 0-Day ★ Google Project Zero
Triaged: March 5, 2026 1 article Published: 2017-03-17

EPSS Score

Source: FIRST.org · 2026-05-23
36.69%
probability
This CVE has a 36.69% probability of being exploited in the next 30 days.
0% Top 97.2th percentile of all CVEs 100%

CVSS v3.1

Source: VulnerabilityLookup (CIRCL)
6.5
MEDIUM
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
Required
Scope
Unchanged
Confidentiality
High
Integrity
None
Availability
None
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N

CVSS v2 (legacy)

4.3
MEDIUM
Access Vector
Network
Access Complexity
Medium
Authentication
None
Confidentiality
Partial
Integrity
None
Availability
None
AV:N/AC:M/Au:N/C:P/I:N/A:N

Description

VulnerabilityLookup (CNA)
Microsoft XML Core Services (MSXML) in Windows 10 Gold, 1511, and 1607; Windows 7 SP1; Windows 8.1; Windows RT 8.1; Windows Server 2008 SP2 and R2 SP1; Windows Server 2012 Gold and R2; Windows Server 2016; and Windows Vista SP2 improperly handles objects in memory, allowing attackers to test for files on disk via a crafted web site, aka "Microsoft XML Information Disclosure Vulnerability."

Affected Products

Microsoft Corporation
XML Core Services
XML Core Services (MSXML) in Windows 10 Gold, 1511, and 1607; Windows 7 SP1; Windows 8.1; Windows RT 8.1; Windows Server 2008 SP2 and R2 SP1; Windows Server 2012 Gold and R2; Windows Server 2016; and Windows Vista SP2

Attack Intelligence

Google Project Zero

Patched
March 14, 2017
Reported by
Will Matcalf of Proofpoint, Kafeine of Proofpoint, Joseph C Chen of Trend Micro, Brooks Li of Trend Micro
Root Cause Analysis
???

Signal Intelligence

Confidence
95%
EPSS 36.69%
CVSS v3.1 6.5
Mentions 1
Last Seen Mar 27, 2017

CNA Information

CNA Assigner
microsoft

Analyst Note

Auto-imported from Google Project Zero — confirmed zero-day by definition.

Triage Info

Decided atMar 05, 2026
Published DateMar 17, 2017