Security News > 2020 > June > SMBGhost RCE Exploit Threatens Corporate Networks
The release of a fully functional proof-of-concept exploit for a critical, wormable remote code-execution vulnerability in Windows could spark a wave of cyberattacks, the feds have warned.
Microsoft patched the bug tracked as CVE-2020-0796 back in March; also known as SMBGhost or CoronaBlue, it affects Windows 10 and Windows Server 2019.
The PoC is notable because it achieves RCE - previous attempts to exploit SMBGhost have resulted only in denial of service or local privilege escalation, according to security analysts.
"While there have already been many public reports and PoCs of LPE, none of them have shown that RCE is actually possible so far," said researchers at Ricerca Security, who did a full writeup of Chompie's exploit.
"In the latest version of Windows 10, RCE became extremely challenging owing to almost flawless address randomization," the researchers explained.
News URL
https://threatpost.com/smbghost-rce-exploit-corporate-networks/156391/
Related Vulnerability
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2020-03-12 | CVE-2020-0796 | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Microsoft Windows 10 and Windows Server 2016 A remote code execution vulnerability exists in the way that the Microsoft Server Message Block 3.1.1 (SMBv3) protocol handles certain requests, aka 'Windows SMBv3 Client/Server Remote Code Execution Vulnerability'. | 10.0 |