INITIALIZING
📧 info@ciso.sa | 📱 +966550939344 | Riyadh, Kingdom of Saudi Arabia
🔧 Scheduled Maintenance — Saturday 2:00-4:00 AM AST. Some features may be temporarily unavailable.    ●   
💎
Pro Plan 50% Off Unlock all AI features, unlimited reports, and priority support. Upgrade
Search Center
ESC to close
Global data_breach Government CRITICAL 4h Global ransomware Financial Services / Cybersecurity CRITICAL 4h Global vulnerability Information Technology / Cybersecurity CRITICAL 6h Global malware Energy and Utilities CRITICAL 7h Global ransomware Multiple sectors CRITICAL 7h Global vulnerability Industrial Control Systems / IoT / Infrastructure CRITICAL 10h Global supply_chain Information Technology and Critical Infrastructure CRITICAL 10h Global phishing Multiple sectors HIGH 10h Global insider Cybersecurity Services CRITICAL 11h Global ransomware Multiple sectors (U.S. companies) CRITICAL 11h Global data_breach Government CRITICAL 4h Global ransomware Financial Services / Cybersecurity CRITICAL 4h Global vulnerability Information Technology / Cybersecurity CRITICAL 6h Global malware Energy and Utilities CRITICAL 7h Global ransomware Multiple sectors CRITICAL 7h Global vulnerability Industrial Control Systems / IoT / Infrastructure CRITICAL 10h Global supply_chain Information Technology and Critical Infrastructure CRITICAL 10h Global phishing Multiple sectors HIGH 10h Global insider Cybersecurity Services CRITICAL 11h Global ransomware Multiple sectors (U.S. companies) CRITICAL 11h Global data_breach Government CRITICAL 4h Global ransomware Financial Services / Cybersecurity CRITICAL 4h Global vulnerability Information Technology / Cybersecurity CRITICAL 6h Global malware Energy and Utilities CRITICAL 7h Global ransomware Multiple sectors CRITICAL 7h Global vulnerability Industrial Control Systems / IoT / Infrastructure CRITICAL 10h Global supply_chain Information Technology and Critical Infrastructure CRITICAL 10h Global phishing Multiple sectors HIGH 10h Global insider Cybersecurity Services CRITICAL 11h Global ransomware Multiple sectors (U.S. companies) CRITICAL 11h
Vulnerabilities

CVE-2017-0146

Critical 🇺🇸 CISA KEV ⚡ Exploit Available
Microsoft Windows SMB Remote Code Execution Vulnerability — The SMBv1 server in Microsoft Windows allows remote attackers to perform remote code execution.
Published: Mar 25, 2022  ·  Source: CISA_KEV
CVSS v3
9.0
🔗 NVD Official
📄 Description (English)

Microsoft Windows SMB Remote Code Execution Vulnerability — The SMBv1 server in Microsoft Windows allows remote attackers to perform remote code execution.

🤖 AI Executive Summary

CVE-2017-0146 is a critical remote code execution vulnerability in Microsoft Windows SMBv1 server, famously exploited by the EternalChampion exploit from the NSA toolkit leaked by the Shadow Brokers. This vulnerability allows unauthenticated remote attackers to execute arbitrary code on vulnerable Windows systems via specially crafted SMB packets. It was actively exploited in the WannaCry and NotPetya ransomware campaigns that caused billions of dollars in global damage. Despite patches being available since March 2017 (MS17-010), many organizations worldwide, including in Saudi Arabia, still have unpatched systems exposed.

📄 Description (Arabic)

🤖 AI Intelligence Analysis Analyzed: Apr 7, 2026 04:49
🇸🇦 Saudi Arabia Impact Assessment
هذه الثغرة تشكل خطراً بالغاً على جميع القطاعات السعودية. قطاع الطاقة (أرامكو وشركات البتروكيماويات) معرض بشكل خاص نظراً لاستخدام أنظمة Windows القديمة في بيئات التشغيل الصناعية (OT/ICS). القطاع المصرفي (المنظم من قبل ساما) والقطاع الحكومي (المنظم من قبل الهيئة الوطنية للأمن السيبراني) معرضان أيضاً. قطاع الاتصالات (STC وزين وموبايلي) وقطاع الرعاية الصحية يواجهان مخاطر عالية. المملكة العربية السعودية كانت من الدول المستهدفة في هجمات WannaCry عام 2017، وأي أنظمة لا تزال غير محدثة تمثل تهديداً مباشراً للبنية التحتية الوطنية.
🏢 Affected Saudi Sectors
Banking Government Energy Healthcare Telecommunications Education Defense Transportation Retail
⚖️ Saudi Risk Score (AI)
9.5
/ 10.0
🔧 Remediation Steps (English)
IMMEDIATE ACTIONS:
1. Apply Microsoft Security Bulletin MS17-010 immediately on all Windows systems. Patches are available for Windows Vista through Windows Server 2016, and Microsoft released emergency patches for Windows XP and Server 2003.
2. Disable SMBv1 protocol across the entire environment: Set-SmbServerConfiguration -EnableSMB1Protocol $false (PowerShell) or via Group Policy.
3. Block TCP ports 445 and 139 at the network perimeter and between network segments where SMB is not required.

DETECTION:
4. Deploy IDS/IPS signatures for EternalBlue/EternalChampion/EternalRomance exploit attempts.
5. Monitor for unusual SMB traffic patterns, especially large volumes of SMB negotiation packets.
6. Use vulnerability scanners to identify all systems still running SMBv1.
7. Check for indicators of compromise associated with WannaCry, NotPetya, and other malware leveraging this vulnerability.

COMPENSATING CONTROLS:
8. Implement network segmentation to isolate legacy systems that cannot be immediately patched.
9. Deploy endpoint detection and response (EDR) solutions on all endpoints.
10. Ensure robust backup and recovery procedures are in place and tested.
🔧 خطوات المعالجة (العربية)
الإجراءات الفورية:
1. تطبيق تحديث الأمان MS17-010 من مايكروسوفت فوراً على جميع أنظمة Windows. التصحيحات متوفرة لأنظمة Windows Vista حتى Windows Server 2016، كما أصدرت مايكروسوفت تصحيحات طارئة لأنظمة Windows XP و Server 2003.
2. تعطيل بروتوكول SMBv1 في جميع البيئات باستخدام: Set-SmbServerConfiguration -EnableSMB1Protocol $false أو عبر سياسات المجموعة.
3. حظر منافذ TCP 445 و 139 على محيط الشبكة وبين أجزاء الشبكة حيث لا يكون SMB مطلوباً.

الكشف والمراقبة:
4. نشر توقيعات IDS/IPS للكشف عن محاولات استغلال EternalBlue/EternalChampion/EternalRomance.
5. مراقبة أنماط حركة SMB غير العادية، خاصة الكميات الكبيرة من حزم تفاوض SMB.
6. استخدام أدوات فحص الثغرات لتحديد جميع الأنظمة التي لا تزال تشغل SMBv1.
7. التحقق من مؤشرات الاختراق المرتبطة بـ WannaCry و NotPetya والبرمجيات الخبيثة الأخرى.

الضوابط التعويضية:
8. تنفيذ تجزئة الشبكة لعزل الأنظمة القديمة التي لا يمكن تحديثها فوراً.
9. نشر حلول الكشف والاستجابة على نقاط النهاية (EDR).
10. التأكد من وجود إجراءات نسخ احتياطي واسترداد قوية ومختبرة.
📋 Regulatory Compliance Mapping
🟢 NCA ECC 2024
2-2: Cybersecurity Risk Management 2-3: Cybersecurity Architecture 2-6: Vulnerability Management 2-9: Cybersecurity Event Management and Monitoring 2-14: Physical Security
🔵 SAMA CSF
3.1: Cyber Security Risk Management 3.3: Cyber Security Operations and Technology 3.3.4: Patch Management 3.3.5: Vulnerability Management 3.3.7: Network Security
🟡 ISO 27001:2022
A.8.8: Management of technical vulnerabilities A.8.9: Configuration management A.8.20: Networks security A.8.21: Security of network services A.8.22: Segregation of networks
🟣 PCI DSS v4.0
6.3.3: Install applicable security patches within one month of release 11.3: External and internal penetration testing 1.3: Network access to the cardholder data environment is restricted 5.2: Malicious software is prevented or detected and addressed
🔗 References & Sources 0
No references.
📦 Affected Products / CPE 1 entries
Microsoft:Windows
📊 CVSS Score
9.0
/ 10.0 — Critical
📋 Quick Facts
Severity Critical
CVSS Score9.0
EPSS93.29%
Exploit ✓ Yes
Patch ✓ Yes
CISA KEV🇺🇸 Yes
KEV Due Date2022-04-15
Published 2022-03-25
Source Feed cisa_kev
Views 1
🇸🇦 Saudi Risk Score
9.5
/ 10.0 — Saudi Risk
🏷️ Tags
kev actively-exploited ransomware
Share this CVE
📣 Found this valuable?
Share it with your cybersecurity network
in LinkedIn 𝕏 X / Twitter 💬 WhatsApp ✈ Telegram
🍪 Privacy Preferences
CISO Consulting — Compliant with Saudi Personal Data Protection Law (PDPL)
We use cookies and similar technologies to provide the best experience on our platform. You can choose which types you accept.
🔒
Essential Always On
Required for the website to function properly. Cannot be disabled.
📋 Sessions, CSRF tokens, authentication, language preferences
📊
Analytics
Help us understand how visitors use the site and improve performance.
📋 Page views, session duration, traffic sources, performance metrics
⚙️
Functional
Enable enhanced features like content personalization and preferences.
📋 Dark/light theme, font size, custom dashboards, saved filters
📣
Marketing
Used to deliver content and ads relevant to your interests.
📋 Campaign tracking, retargeting, social media analytics
Privacy Policy →
CISO AI Assistant
Ask anything · Documents · Support
🔐

Introduce Yourself

Enter your details to access the full assistant

Your info is private and never shared
💬
CyberAssist
Online · responds in seconds
5 / 5
🔐 Verify Your Identity

Enter your email to receive a verification code before submitting a support request.

Enter to send · / for commands 0 / 2000
CISO AI · Powered by Anthropic Claude
✦ Quick Survey Help Us Improve CISO Consulting Your feedback shapes the future of our platform — takes less than 2 minutes.
⚠ Please answer this question to continue

How would you rate your overall experience with our platform?

Rate from 1 (poor) to 5 (excellent)

🎉
Thank you!
Your response has been recorded.