Microsoft Malware Protection Engine < 1.1.13903 RCE

high Nessus Plugin ID 101027
New! Vulnerability Priority Rating (VPR)

Tenable calculates a dynamic VPR for every vulnerability. VPR combines vulnerability information with threat intelligence and machine learning algorithms to predict which vulnerabilities are most likely to be exploited in attacks. Read more about what VPR is and how it is different from CVSS.

VPR Score: 7.4


The remote host has an antimalware application installed that is affected by a remote code execution vulnerability.


The version of Microsoft Malware Protection Engine (MMPE) installed on the remote Windows host is prior to 1.1.13903.0. It is, therefore, affected by a remote code execution vulnerability due to improper handling of files during scanning. An unauthenticated, remote attacker can exploit this, via a specially crafted file, to execute arbitrary code in the security context of the LocalSystem account. Note that only x86 or 32-bit based versions of the MMPE are affected by this vulnerability.

Nessus has checked if a vulnerable version of MMPE is being used by any of the following applications :

- Microsoft Forefront Endpoint Protection 2010.

- Microsoft Endpoint Protection.

- Microsoft Forefront Security for SharePoint.

- Microsoft System Center Endpoint Protection.

- Microsoft Security Essentials.

- Windows Defender for Windows 7, Windows 8.1, Windows RT 8.1, Windows 10, Windows 10 1511, Windows 10 1607, Windows 10 1703, and Windows Server 2016.

- Windows Intune Endpoint Protection.


Enable automatic updates to update the scan engine for the relevant antimalware applications.

See Also

Plugin Details

Severity: High

ID: 101027

File Name: microsoft_mpeng_1_1_13903.nasl

Version: 1.8

Type: local

Agent: windows

Family: Windows

Published: 6/23/2017

Updated: 11/13/2019

Dependencies: smb_hotfixes.nasl, fcs_installed.nasl

Risk Information

Risk Factor: High

VPR Score: 7.4

CVSS Score Source: CVE-2017-8558

CVSS v2.0

Base Score: 9.3

Temporal Score: 7.3

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:POC/RL:OF/RC:C

CVSS v3.0

Base Score: 7.8

Temporal Score: 7

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C

Vulnerability Information

CPE: cpe:2.3:a:microsoft:malware_protection_engine:*:*:*:*:*:*:*:*, cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*

Required KB Items: SMB/Registry/Enumerated, SMB/ARCH

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 6/23/2017

Vulnerability Publication Date: 6/23/2017

Reference Information

CVE: CVE-2017-8558

BID: 99262