Search for vulnerabilities
Vulnerability details: VCID-5jzd-by8v-a7h5
Vulnerability ID VCID-5jzd-by8v-a7h5
Aliases CVE-2017-10243
Summary
Status Published
Exploitability 0.5
Weighted Severity 5.9
Risk 3.0
Affected and Fixed Packages Package Details
Weaknesses (0)
There are no known CWE.
System Score Found at
ssvc Track https://access.redhat.com/errata/RHSA-2017:1789
ssvc Track https://access.redhat.com/errata/RHSA-2017:1790
ssvc Track https://access.redhat.com/errata/RHSA-2017:1791
ssvc Track https://access.redhat.com/errata/RHSA-2017:1792
ssvc Track https://access.redhat.com/errata/RHSA-2017:2424
ssvc Track https://access.redhat.com/errata/RHSA-2017:2469
ssvc Track https://access.redhat.com/errata/RHSA-2017:2481
ssvc Track https://access.redhat.com/errata/RHSA-2017:2530
ssvc Track https://access.redhat.com/errata/RHSA-2017:3453
cvssv3 6.5 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10243.json
epss 0.00562 https://api.first.org/data/v1/epss?cve=CVE-2017-10243
epss 0.00562 https://api.first.org/data/v1/epss?cve=CVE-2017-10243
epss 0.00562 https://api.first.org/data/v1/epss?cve=CVE-2017-10243
epss 0.00562 https://api.first.org/data/v1/epss?cve=CVE-2017-10243
epss 0.00562 https://api.first.org/data/v1/epss?cve=CVE-2017-10243
epss 0.00562 https://api.first.org/data/v1/epss?cve=CVE-2017-10243
epss 0.00562 https://api.first.org/data/v1/epss?cve=CVE-2017-10243
epss 0.00562 https://api.first.org/data/v1/epss?cve=CVE-2017-10243
epss 0.00562 https://api.first.org/data/v1/epss?cve=CVE-2017-10243
epss 0.00562 https://api.first.org/data/v1/epss?cve=CVE-2017-10243
epss 0.00562 https://api.first.org/data/v1/epss?cve=CVE-2017-10243
epss 0.00562 https://api.first.org/data/v1/epss?cve=CVE-2017-10243
epss 0.00562 https://api.first.org/data/v1/epss?cve=CVE-2017-10243
epss 0.00562 https://api.first.org/data/v1/epss?cve=CVE-2017-10243
epss 0.00562 https://api.first.org/data/v1/epss?cve=CVE-2017-10243
epss 0.00562 https://api.first.org/data/v1/epss?cve=CVE-2017-10243
cvssv2 6.4 https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
cvssv3 6.5 https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
ssvc Track https://security.gentoo.org/glsa/201709-22
ssvc Track https://security.netapp.com/advisory/ntap-20170720-0001/
ssvc Track http://www.debian.org/security/2017/dsa-3954
ssvc Track http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
ssvc Track http://www.securityfocus.com/bid/99827
ssvc Track http://www.securitytracker.com/id/1038931
Reference id Reference type URL
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10243.json
https://api.first.org/data/v1/epss?cve=CVE-2017-10243
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10053
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10067
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10074
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10078
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10081
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10087
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10089
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10090
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10096
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10101
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10102
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10107
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10108
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10109
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10110
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10111
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10115
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10116
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10118
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10135
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10176
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10193
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10198
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10243
https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
1038931 http://www.securitytracker.com/id/1038931
1472666 https://bugzilla.redhat.com/show_bug.cgi?id=1472666
201709-22 https://security.gentoo.org/glsa/201709-22
99827 http://www.securityfocus.com/bid/99827
dsa-3954 http://www.debian.org/security/2017/dsa-3954
ntap-20170720-0001 https://security.netapp.com/advisory/ntap-20170720-0001/
RHSA-2017:1789 https://access.redhat.com/errata/RHSA-2017:1789
RHSA-2017:1790 https://access.redhat.com/errata/RHSA-2017:1790
RHSA-2017:1791 https://access.redhat.com/errata/RHSA-2017:1791
RHSA-2017:1792 https://access.redhat.com/errata/RHSA-2017:1792
RHSA-2017:2424 https://access.redhat.com/errata/RHSA-2017:2424
RHSA-2017:2469 https://access.redhat.com/errata/RHSA-2017:2469
RHSA-2017:2481 https://access.redhat.com/errata/RHSA-2017:2481
RHSA-2017:2530 https://access.redhat.com/errata/RHSA-2017:2530
RHSA-2017:3453 https://access.redhat.com/errata/RHSA-2017:3453
USN-3366-1 https://usn.ubuntu.com/3366-1/
USN-3396-1 https://usn.ubuntu.com/3396-1/
No exploits are available.

Vector: SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:17Z/ Found at https://access.redhat.com/errata/RHSA-2017:1789

Vector: SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:17Z/ Found at https://access.redhat.com/errata/RHSA-2017:1790

Vector: SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:17Z/ Found at https://access.redhat.com/errata/RHSA-2017:1791

Vector: SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:17Z/ Found at https://access.redhat.com/errata/RHSA-2017:1792

Vector: SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:17Z/ Found at https://access.redhat.com/errata/RHSA-2017:2424

Vector: SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:17Z/ Found at https://access.redhat.com/errata/RHSA-2017:2469

Vector: SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:17Z/ Found at https://access.redhat.com/errata/RHSA-2017:2481

Vector: SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:17Z/ Found at https://access.redhat.com/errata/RHSA-2017:2530

Vector: SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:17Z/ Found at https://access.redhat.com/errata/RHSA-2017:3453
Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L Found at https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10243.json
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: AV:N/AC:L/Au:N/C:P/I:N/A:P Found at https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
Exploitability (E) Access Vector (AV) Access Complexity (AC) Authentication (Au) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

high

functional

unproven

proof_of_concept

not_defined

local

adjacent_network

network

high

medium

low

multiple

single

none

none

partial

complete

none

partial

complete

none

partial

complete

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L Found at https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:17Z/ Found at https://security.gentoo.org/glsa/201709-22

Vector: SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:17Z/ Found at https://security.netapp.com/advisory/ntap-20170720-0001/

Vector: SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:17Z/ Found at http://www.debian.org/security/2017/dsa-3954

Vector: SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:17Z/ Found at http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html

Vector: SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:17Z/ Found at http://www.securityfocus.com/bid/99827

Vector: SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:17Z/ Found at http://www.securitytracker.com/id/1038931
Exploit Prediction Scoring System (EPSS)
Percentile 0.67356
EPSS Score 0.00562
Published At July 30, 2025, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
2025-07-31T08:37:28.123698+00:00 Ubuntu USN Importer Import https://usn.ubuntu.com/3396-1/ 37.0.0