I scan all my systems on Windows 2012 R2 and 2016, and I have this vulnerability discovered.
I don’t understand because they are all patched for a long time.
I’ve tried the nmap exploit : smb-vuln-ms17-010.nse and all seems to be OK, the same using a PowerShell script : Verify_MS17-010.PS1
The VT is :
Microsoft Windows is prone to a remote code-execution vulnerability when processing the protocol headers for the Server Message Block (SMB) Negotiate Protocol Request. NOTE: Reportedly, for this issue to be exploitable, file sharing must be enabled.
Vulnerability was detected according to the Detection Method.
Opens a TCP socket to send a crafted request and checks if the host responds to a second request after a few seconds.
|Details:||[Microsoft Windows SMB2 ‘_Smb2ValidateProviderCallback()’ Remote Code E… OID: 126.96.36.199.4.1.256188.8.131.52283]|
Windows 7 RC, Vista and 2008 Server are vulnerable, other versions may also be affected. NOTE: Reportedly, Windows XP and 2000 are not affected. UPDATE (September 9, 2009): Symantec has confirmed the issue on Windows Vista SP1 and Windows Server 2008.
An attacker can exploit this issue to execute code with SYSTEM-level privileges. failed exploit attempts will likely cause denial-of-service conditions.
Microsoft has released updates to fix the issue. Please see the references for more information.
Can you help me,is it a false positive ?