Security News > 2020 > March > Wormable Windows SMBv3 RCE flaw leaked, but not patched

Wormable Windows SMBv3 RCE flaw leaked, but not patched
2020-03-11 10:42

"To exploit the vulnerability against an SMB Server, an unauthenticated attacker could send a specially crafted packet to a targeted SMBv3 Server. To exploit the vulnerability against an SMB Client, an unauthenticated attacker would need to configure a malicious SMBv3 Server and convince a user to connect to it."

Unlike the Microsoft Windows SMB Server flaws used by the EternalBlue and EternalRomance exploits, which were leveraged for the 2017 WannaCry and NotPetya outbreaks, CVE-2020-0796 only affects SMBv3 and does not affect Windows 7 and Windows Server 2008 R2 systems.

Keep calm, your Windows 7 embedded systems offering SMB over the Internet are safe 😅. As it only affects SMBv3, which reduces the previous attack surface significantly.

According to Microsoft's advisory, it affects Windows 10 and Windows Server.

Disable SMBv3 compression to block unauthenticated attackers from exploiting the vulnerability against an SMBv3 Server.


News URL

http://feedproxy.google.com/~r/HelpNetSecurity/~3/RdJ4EFCJBqM/

Related Vulnerability

DATE CVE VULNERABILITY TITLE RISK
2020-03-12 CVE-2020-0796 Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Microsoft Windows 10 and Windows Server 2016
A remote code execution vulnerability exists in the way that the Microsoft Server Message Block 3.1.1 (SMBv3) protocol handles certain requests, aka 'Windows SMBv3 Client/Server Remote Code Execution Vulnerability'.
network
low complexity
microsoft CWE-119
7.5