--- licence_title: Creative Commons Attribution 4.0 International (CC-BY 4.0) licence_link: https://creativecommons.org/licenses/by/4.0/ licence_restrictions: https://cert.europa.eu/legal-notice licence_author: CERT-EU, The Cybersecurity Service for the European Union institutions, bodies, offices and agencies title: 'Important Vulnerability in Windows SMBv3' version: '1.0' number: '2022-016' date: 'March 10, 2022' --- _History:_ * _10/03/2022 --- v1.0 -- Initial publication_ # Summary On March 8th, Microsoft fixed in the monthly Patch Tuesday 71 vulnerabilities with three classified as **Critical** as they allow remote code execution [1]. A remote code execution vulnerability classified as **Important** affects Windows SMBv3 Client/Server. The vulnerability tracked as CVE-2022-24508 is a remote code execution vulnerability allowing an authenticated user to execute malicious code on Windows 10 version 2004 and newer systems via SMBv3 [2]. No active exploitation of this vulnerability is known yet. # Technical Details There is not much detail available about how this vulnerability could be exploited. However, it is notable because it is listed as _Exploitation more likely_ by Microsoft. This vulnerability is rated **Important** rather than **Critical**. There is no public disclosure, and it is not currently being exploited. However, the attack vector and likelihood of exploitation make it a candidate for possible attacks, and so this should be a high priority for patching [3]. # Affected Products * Windows 10 Version 21H1 for 32-bit Systems * Windows 10 Version 21H1 for ARM64-based Systems * Windows 10 Version 21H1 for x64-based Systems * Windows 10 Version 20H2 for 32-bit Systems * Windows 10 Version 20H2 for x64-based Systems * Windows Server 2022 Azure Edition Core Hotpatch * Windows Server 2022 (Server Core installation) * Windows Server 2022 * Windows 10 Version 21H2 for x64-based Systems * Windows 10 Version 21H2 for ARM64-based Systems * Windows 10 Version 21H2 for 32-bit Systems * Windows 11 for ARM64-based Systems * Windows 11 for x64-based Systems * Windows Server, version 20H2 (Server Core Installation) * Windows 10 Version 20H2 for ARM64-based Systems # Mitigations Microsoft strongly recommends to install the updates but also provide workaround steps by disabling SMBv3 compression [4]. # Recommendations CERT-EU recommends to apply the patches released on March 2022 Patch Tuesday [5]. # References [1] [2] [3] [4] [5]