INITIALIZING
📧 info@ciso.sa | 📱 +966550939344 | Riyadh, Kingdom of Saudi Arabia
🔧 Scheduled Maintenance — Saturday 2:00-4:00 AM AST. Some features may be temporarily unavailable.    ●   
💎
Pro Plan 50% Off Unlock all AI features, unlimited reports, and priority support. Upgrade
Search Center
ESC to close
Global data_breach Government CRITICAL 1h Global ransomware Financial Services / Cybersecurity CRITICAL 2h Global vulnerability Information Technology / Cybersecurity CRITICAL 4h Global malware Energy and Utilities CRITICAL 5h Global ransomware Multiple sectors CRITICAL 5h Global vulnerability Industrial Control Systems / IoT / Infrastructure CRITICAL 7h Global supply_chain Information Technology and Critical Infrastructure CRITICAL 8h Global phishing Multiple sectors HIGH 8h Global insider Cybersecurity Services CRITICAL 8h Global ransomware Multiple sectors (U.S. companies) CRITICAL 9h Global data_breach Government CRITICAL 1h Global ransomware Financial Services / Cybersecurity CRITICAL 2h Global vulnerability Information Technology / Cybersecurity CRITICAL 4h Global malware Energy and Utilities CRITICAL 5h Global ransomware Multiple sectors CRITICAL 5h Global vulnerability Industrial Control Systems / IoT / Infrastructure CRITICAL 7h Global supply_chain Information Technology and Critical Infrastructure CRITICAL 8h Global phishing Multiple sectors HIGH 8h Global insider Cybersecurity Services CRITICAL 8h Global ransomware Multiple sectors (U.S. companies) CRITICAL 9h Global data_breach Government CRITICAL 1h Global ransomware Financial Services / Cybersecurity CRITICAL 2h Global vulnerability Information Technology / Cybersecurity CRITICAL 4h Global malware Energy and Utilities CRITICAL 5h Global ransomware Multiple sectors CRITICAL 5h Global vulnerability Industrial Control Systems / IoT / Infrastructure CRITICAL 7h Global supply_chain Information Technology and Critical Infrastructure CRITICAL 8h Global phishing Multiple sectors HIGH 8h Global insider Cybersecurity Services CRITICAL 8h Global ransomware Multiple sectors (U.S. companies) CRITICAL 9h
Vulnerabilities

CVE-2017-8543

Critical 🇺🇸 CISA KEV ⚡ Exploit Available
Microsoft Windows Search Remote Code Execution Vulnerability — Microsoft Windows allows an attacker to take control of the affected system when Windows Search fails to handle objects in memory.
Published: May 24, 2022  ·  Source: CISA_KEV
CVSS v3
9.0
🔗 NVD Official
📄 Description (English)

Microsoft Windows Search Remote Code Execution Vulnerability — Microsoft Windows allows an attacker to take control of the affected system when Windows Search fails to handle objects in memory.

🤖 AI Executive Summary

CVE-2017-8543 is a critical remote code execution vulnerability in Microsoft Windows Search that allows attackers to take complete control of affected systems by exploiting how Windows Search handles objects in memory. With a CVSS score of 9.0 and known exploits available in the wild, this vulnerability poses an extreme risk to unpatched Windows environments. The vulnerability affects multiple versions of Windows and can be exploited remotely via SMB connections, making it wormable in nature. Microsoft has released patches, and immediate remediation is essential given active exploitation.

📄 Description (Arabic)

🤖 AI Intelligence Analysis Analyzed: Apr 9, 2026 02:33
🇸🇦 Saudi Arabia Impact Assessment
هذه الثغرة تشكل خطراً كبيراً على جميع القطاعات السعودية التي تعتمد على أنظمة ويندوز. القطاع المصرفي (المنظم من قبل ساما) والقطاع الحكومي (المنظم من قبل الهيئة الوطنية للأمن السيبراني) معرضان بشكل خاص نظراً لانتشار أنظمة ويندوز الواسع. قطاع الطاقة بما في ذلك أرامكو وشركات البتروكيماويات، وقطاع الاتصالات (STC وغيرها)، والقطاع الصحي جميعها معرضة للخطر. الطبيعة القابلة للانتشار الذاتي عبر SMB تجعل الشبكات الداخلية الكبيرة في المؤسسات السعودية هدفاً رئيسياً، خاصة في البيئات التي لا تزال تستخدم إصدارات قديمة من ويندوز.
🏢 Affected Saudi Sectors
Banking Government Energy Telecommunications Healthcare Education Defense Retail Transportation
⚖️ Saudi Risk Score (AI)
9.2
/ 10.0
🔧 Remediation Steps (English)
IMMEDIATE ACTIONS:
1. Apply Microsoft security update MS17-022 / KB4022719 immediately on all affected Windows systems
2. If patching is not immediately possible, disable the Windows Search service (WSearch) as a temporary mitigation: sc stop WSearch && sc config WSearch start=disabled
3. Block inbound SMB connections (TCP port 445) at network perimeters and segment internal networks

PATCHING GUIDANCE:
4. Prioritize internet-facing systems and critical infrastructure servers
5. Test and deploy patches through WSUS or SCCM in a staged rollout
6. Verify patch installation using vulnerability scanners

COMPENSATING CONTROLS:
7. Implement network segmentation to limit SMB lateral movement
8. Enable Windows Firewall rules to restrict SMB traffic between workstations
9. Deploy endpoint detection and response (EDR) solutions with memory exploitation detection

DETECTION RULES:
10. Monitor for anomalous Windows Search service behavior and crashes
11. Alert on unusual SMB traffic patterns, especially lateral connections on port 445
12. Deploy IDS/IPS signatures for CVE-2017-8543 exploitation attempts
13. Monitor Windows Event Logs for SearchIndexer.exe crashes or unusual child processes
🔧 خطوات المعالجة (العربية)
الإجراءات الفورية:
1. تطبيق تحديث مايكروسوفت الأمني MS17-022 / KB4022719 فوراً على جميع أنظمة ويندوز المتأثرة
2. في حال عدم إمكانية التحديث الفوري، تعطيل خدمة البحث في ويندوز (WSearch) كإجراء مؤقت: sc stop WSearch && sc config WSearch start=disabled
3. حظر اتصالات SMB الواردة (منفذ TCP 445) على حدود الشبكة وتقسيم الشبكات الداخلية

إرشادات التحديث:
4. إعطاء الأولوية للأنظمة المواجهة للإنترنت وخوادم البنية التحتية الحرجة
5. اختبار ونشر التحديثات عبر WSUS أو SCCM بشكل تدريجي
6. التحقق من تثبيت التحديثات باستخدام أدوات فحص الثغرات

الضوابط التعويضية:
7. تطبيق تقسيم الشبكة للحد من الحركة الجانبية عبر SMB
8. تفعيل قواعد جدار حماية ويندوز لتقييد حركة SMB بين محطات العمل
9. نشر حلول الكشف والاستجابة على نقاط النهاية (EDR) مع كشف استغلال الذاكرة

قواعد الكشف:
10. مراقبة السلوك غير الطبيعي لخدمة البحث في ويندوز وتعطلها
11. التنبيه على أنماط حركة SMB غير العادية خاصة الاتصالات الجانبية على المنفذ 445
12. نشر توقيعات IDS/IPS لمحاولات استغلال CVE-2017-8543
13. مراقبة سجلات أحداث ويندوز لتعطل SearchIndexer.exe أو العمليات الفرعية غير العادية
📋 Regulatory Compliance Mapping
🟢 NCA ECC 2024
2-3-1 (Patch Management) 2-3-4 (Vulnerability Management) 2-5-1 (Network Security) 2-2-1 (Asset Management) 2-6-1 (Incident Management)
🔵 SAMA CSF
3.3.3 (Patch Management) 3.3.4 (Vulnerability Management) 3.3.7 (Network Security Management) 3.4.1 (Incident Detection) 3.3.5 (Secure Configuration)
🟡 ISO 27001:2022
A.8.8 (Management of technical vulnerabilities) A.8.9 (Configuration management) A.8.20 (Networks security) A.8.22 (Segregation of networks) A.5.24 (Information security incident management planning)
🟣 PCI DSS v4.0
6.3.3 (Install critical security patches within one month) 11.3 (Penetration testing) 1.3 (Network access controls) 5.2 (Anti-malware mechanisms) 6.2 (System components are protected from known vulnerabilities)
🔗 References & Sources 0
No references.
📦 Affected Products / CPE 1 entries
Microsoft:Windows
📊 CVSS Score
9.0
/ 10.0 — Critical
📋 Quick Facts
Severity Critical
CVSS Score9.0
EPSS83.80%
Exploit ✓ Yes
Patch ✓ Yes
CISA KEV🇺🇸 Yes
KEV Due Date2022-06-14
Published 2022-05-24
Source Feed cisa_kev
Views 1
🇸🇦 Saudi Risk Score
9.2
/ 10.0 — Saudi Risk
🏷️ Tags
kev actively-exploited
Share this CVE
📣 Found this valuable?
Share it with your cybersecurity network
in LinkedIn 𝕏 X / Twitter 💬 WhatsApp ✈ Telegram
🍪 Privacy Preferences
CISO Consulting — Compliant with Saudi Personal Data Protection Law (PDPL)
We use cookies and similar technologies to provide the best experience on our platform. You can choose which types you accept.
🔒
Essential Always On
Required for the website to function properly. Cannot be disabled.
📋 Sessions, CSRF tokens, authentication, language preferences
📊
Analytics
Help us understand how visitors use the site and improve performance.
📋 Page views, session duration, traffic sources, performance metrics
⚙️
Functional
Enable enhanced features like content personalization and preferences.
📋 Dark/light theme, font size, custom dashboards, saved filters
📣
Marketing
Used to deliver content and ads relevant to your interests.
📋 Campaign tracking, retargeting, social media analytics
Privacy Policy →
CISO AI Assistant
Ask anything · Documents · Support
🔐

Introduce Yourself

Enter your details to access the full assistant

Your info is private and never shared
💬
CyberAssist
Online · responds in seconds
5 / 5
🔐 Verify Your Identity

Enter your email to receive a verification code before submitting a support request.

Enter to send · / for commands 0 / 2000
CISO AI · Powered by Anthropic Claude
✦ Quick Survey Help Us Improve CISO Consulting Your feedback shapes the future of our platform — takes less than 2 minutes.
⚠ Please answer this question to continue

How would you rate your overall experience with our platform?

Rate from 1 (poor) to 5 (excellent)

🎉
Thank you!
Your response has been recorded.