Medium severity6.5CISA KEVNVD Advisory· Published Mar 17, 2017· Updated Apr 22, 2026
CVE-2017-0022
CVE-2017-0022
Description
Microsoft XML Core Services (MSXML) in Windows 10 Gold, 1511, and 1607; Windows 7 SP1; Windows 8.1; Windows RT 8.1; Windows Server 2008 SP2 and R2 SP1; Windows Server 2012 Gold and R2; Windows Server 2016; and Windows Vista SP2 improperly handles objects in memory, allowing attackers to test for files on disk via a crafted web site, aka "Microsoft XML Information Disclosure Vulnerability."
Affected products
5- cpe:2.3:a:microsoft:xml_core_services:3.0:*:*:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*
cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*+ 1 more
- cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
5- portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0022nvdPatchVendor Advisory
- 0patch.blogspot.com/2017/09/exploit-kit-rendezvous-and-cve-2017-0022.htmlnvdExploit
- www.securityfocus.com/bid/96069nvdBroken LinkThird Party AdvisoryVDB Entry
- www.securitytracker.com/id/1038014nvdBroken LinkThird Party AdvisoryVDB Entry
- www.cisa.gov/known-exploited-vulnerabilities-catalognvdUS Government Resource
News mentions
0No linked articles in our index yet.