Security Advisory 2020-014

Release Date:

UPDATE: SMBv3 - Critical Remote Code Execution Vulnerability

Download

History:

  • 11/03/2020 --- v1.0 -- Initial publication
  • 13/03/2020 --- v1.1 -- Update with information about the patch available

Summary

On the 10th of March 2020, Microsoft released a security advisory for a remote code execution vulnerability affecting Microsoft Server Message Block 3.1.1 (SMBv3) protocol [1]. An unauthenticated attacker who successfully exploited the vulnerability could execute code on a target SMB Server or SMB Client. The vulnerability is referenced as CVE-2020-0796.

Microsoft re-released this month's Patch Tuesday security update to fix this vulnerability [4].

Technical Details

The vulnerability can be exploited in two different ways:

  • by sending a specially crafted packet to a targeted SMBv3 server,
  • by convincing a user to connect to a malicious SMBv3 server.

Microsoft has not disclosed the technical information on the vulnerability, however, based on the workaround provided by Microsoft [1], the vulnerability appears to be linked to handling of compressed data packets.

FortiGuard Labs also released an IPS rule describing the vulnerability as being related to a Buffer Overflow [2]. According to FortiGuard Labs, the vulnerability is due to an error when the vulnerable software handles a maliciously crafted compressed data packet.

More technical details have now been provided in [5].

Products Affected

  • Windows 10 Version 1903 for 32-bit Systems
  • Windows 10 Version 1903 for ARM64-based Systems
  • Windows 10 Version 1903 for x64-based Systems
  • Windows 10 Version 1909 for 32-bit Systems
  • Windows 10 Version 1909 for ARM64-based Systems
  • Windows 10 Version 1909 for x64-based Systems
  • Windows Server, version 1903 (Server Core installation)
  • Windows Server, version 1909 (Server Core installation)

Recommendations

Microsoft has released a patch for this vulnerability [4]. It is strongly advised to apply the security update KB4551762 from Microsoft to fix this vulnerability as soon as possible.

References

[1] https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/adv200005

[2] https://fortiguard.com/encyclopedia/ips/48773

[3] https://support.microsoft.com/en-us/help/3185535/preventing-smb-traffic-from-lateral-connections

[4] https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0796

[5] https://www.synacktiv.com/posts/exploit/im-smbghost-daba-dee-daba-da.html

We got cookies

We only use cookies that are necessary for the technical functioning of our website. Find out more on here.