Blog de Zscaler

Reciba en su bandeja de entrada las últimas actualizaciones del blog de Zscaler

Security Research

Microsoft Remote Code Execution vulnerability in SMBv3 service: CVE-2020-0796

image
ROHIT HEGDE
marzo 11, 2020 - 2 Min de lectura

Background

On 12th March 2020 Microsoft has released a Security guidance regarding Remote Code Execution vulnerability in the way that Microsoft Server Message Block 3.1.1 (SMBv3) protocol handles certain requests. A successful exploitation of the vulnerability could provide the attacker the ability to execute arbitrary code on the target SMB Server or SMB client. Microsoft has marked the CVE as Critical and provided an Exploitability index of "1- Exploitation more likely". The security guidance also provides a workaround for this vulnerability.

 

What is the issue?

An unauthenticated attacker could send a specially crafted packet to target SMBv3 Server. To attack an SMB client, an unauthenticated attacker would need to configure a malicious SMBv3 Server and convince the client to connect to it. The specially crafted packet exploits SMBv3.1.1 compression feature.
 

What systems are impacted?

Windows 10 Version 1903, Windows 10 Version 1909, Windows Server Version 1903 and Windows Server Version 1909 running SMBv3 service.

 

What can you do to protect yourself?

Microsoft has not yet released a patch for this vulnerability and recommends a workaround which involves disabling SMBv3 compression. The steps to do this are mentioned in the workarounds section of advisory linked below,

https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0796

They also recommend applying the patch as soon as the update is available.

 

Zscaler Coverage:

We have not seen this vulnerability being exploited in the wild. Zscaler Cloud Sandbox provides proactive coverage against exploit payloads and advanced threats like ransomware, and the Zscaler ThreatLabZ team is actively monitoring for in-the-wild exploit attempts to ensure coverage.

 

form submtited
Gracias por leer

¿Este post ha sido útil?

Exención de responsabilidad: Este blog post ha sido creado por Zscaler con fines informativos exclusivamente y se ofrece "como es" sin ninguna garantía de precisión, integridad o fiabilidad. Zscaler no asume ninguna responsabilidad por errores u omisiones ni por las acciones que se tomen basándose en la información proporcionada. Cualquier sitio web o recurso de terceros enlazado en esta publicación de blog se proporciona únicamente por conveniencia, y Zscaler no se hace responsable de su contenido ni de sus prácticas. Todo el contenido está sujeto a cambios sin previo aviso. Al acceder a este blog, acepta estos términos y reconoce ser el único responsable de verificar y utilizar la información de manera adecuada según sus necesidades.

Reciba en su bandeja de entrada las últimas actualizaciones del blog de Zscaler

Al enviar el formulario, acepta nuestra política de privacidad.