{"api_version":"1","generated_at":"2026-04-23T05:56:34+00:00","cve":"CVE-2017-7441","urls":{"html":"https://cve.report/CVE-2017-7441","api":"https://cve.report/api/cve/CVE-2017-7441.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2017-7441","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2017-7441"},"summary":{"title":"CVE-2017-7441","description":"In Sophos SurfRight HitmanPro before 3.7.20 Build 286 (included in the HitmanPro.Alert solution and Sophos Clean), a crafted IOCTL with code 0x22E1C0 might lead to kernel data leaks. Because the leak occurs at the driver level, an attacker can use this vulnerability to leak some critical information about the machine such as nt!ExpPoolQuotaCookie.","state":"PUBLIC","assigner":"cve@mitre.org","published_at":"2017-09-13 08:29:00","updated_at":"2017-09-26 18:31:00"},"problem_types":["CWE-119"],"metrics":[],"references":[{"url":"https://www.nuitduhack.com/fr/planning/talk_10","name":"https://www.nuitduhack.com/fr/planning/talk_10","refsource":"MISC","tags":["Third Party Advisory"],"title":"(FR) Windows 10 Pool Party | NDH XV","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://trackwatch.com/kernel-pool-overflow-exploitation-in-real-world-windows-10/","name":"https://trackwatch.com/kernel-pool-overflow-exploitation-in-real-world-windows-10/","refsource":"MISC","tags":["Exploit","Mitigation","Third Party Advisory"],"title":"Kernel Pool Overflow Exploitation In Real World – Windows 10 | TRACKWATCH","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2017-7441","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2017-7441","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2017","cve_id":"7441","vulnerable":"1","versionEndIncluding":"3.7.20","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"sophos","cpe5":"hitmanpro","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"CVE_data_meta":{"ASSIGNER":"cve@mitre.org","ID":"CVE-2017-7441","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"n/a","version":{"version_data":[{"version_value":"n/a"}]}}]},"vendor_name":"n/a"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"In Sophos SurfRight HitmanPro before 3.7.20 Build 286 (included in the HitmanPro.Alert solution and Sophos Clean), a crafted IOCTL with code 0x22E1C0 might lead to kernel data leaks. Because the leak occurs at the driver level, an attacker can use this vulnerability to leak some critical information about the machine such as nt!ExpPoolQuotaCookie."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"n/a"}]}]},"references":{"reference_data":[{"name":"https://www.nuitduhack.com/fr/planning/talk_10","refsource":"MISC","url":"https://www.nuitduhack.com/fr/planning/talk_10"},{"name":"https://trackwatch.com/kernel-pool-overflow-exploitation-in-real-world-windows-10/","refsource":"MISC","url":"https://trackwatch.com/kernel-pool-overflow-exploitation-in-real-world-windows-10/"}]}},"nvd":{"publishedDate":"2017-09-13 08:29:00","lastModifiedDate":"2017-09-26 18:31:00","problem_types":["CWE-119"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.0","vectorString":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":7.8,"baseSeverity":"HIGH"},"exploitabilityScore":1.8,"impactScore":5.9},"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE","baseScore":7.2},"severity":"HIGH","exploitabilityScore":3.9,"impactScore":10,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:sophos:hitmanpro:*:*:*:*:*:*:*:*","versionEndIncluding":"3.7.20","cpe_name":[]}]}]}},"legacy_mitre":{"record":{"CveYear":"2017","CveId":"7441","Ordinal":"104245","Title":"CVE-2017-7441","CVE":"CVE-2017-7441","Year":"2017"},"notes":[{"CveYear":"2017","CveId":"7441","Ordinal":"1","NoteData":"In Sophos SurfRight HitmanPro before 3.7.20 Build 286 (included in the HitmanPro.Alert solution and Sophos Clean), a crafted IOCTL with code 0x22E1C0 might lead to kernel data leaks. Because the leak occurs at the driver level, an attacker can use this vulnerability to leak some critical information about the machine such as nt!ExpPoolQuotaCookie.","Type":"Description","Title":null},{"CveYear":"2017","CveId":"7441","Ordinal":"2","NoteData":"2017-09-13","Type":"Other","Title":"Published"},{"CveYear":"2017","CveId":"7441","Ordinal":"3","NoteData":"2017-09-13","Type":"Other","Title":"Modified"}]}}}