### [CVE-2017-0095](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0095) ![](https://img.shields.io/static/v1?label=Product&message=vSMB%20Hyper-V%20in%20Microsoft%20Windows%2010%20Gold%2C%201511%2C%20and%201607%20and%20Windows%20Server%202016.&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Vulnerability&message=Remote%20Code%20Execution&color=brighgreen) ### Description Hyper-V in Microsoft Windows 10 Gold, 1511, and 1607 and Windows Server 2016 does not properly validate vSMB packet data, which allows attackers to execute arbitrary code on a target OS, aka "Hyper-V vSMB Remote Code Execution Vulnerability." This vulnerability is different from that described in CVE-2017-0021. ### POC #### Reference No PoCs from references. #### Github - https://github.com/ARPSyndicate/cvemon - https://github.com/yo-yo-yo-jbo/yo-yo-yo-jbo.github.io