Jump to content

SMBGhost

From Wikipedia, the free encyclopedia

SMBGhost
CVE identifier(s)CVE-2020-0796[1]
Date discovered4 November 2019; 4 years ago (2019-11-04)[1] (note: date cve "assigned")
Date patched10 March 2020[1][2][3]
DiscovererMalware Hunter Team[4][1]
Affected softwareWindows 10 version 1903 and 1909, and Server Core installations of Windows Server, versions 1903 and 1909[5]

SMBGhost (or SMBleedingGhost or CoronaBlue) is a type of security vulnerability, with wormlike features, that affects Windows 10 computers and was first reported publicly on 10 March 2020.[1][2][3][5][6][7][8][9]

Security vulnerability

[edit]

A proof of concept (PoC) exploit code was published 1 June 2020 on GitHub by a security researcher.[8][10] The code could possibly spread to millions of unpatched computers, resulting in as much as tens of billions of dollars in losses.[3]

Microsoft recommends all users of Windows 10 versions 1903 and 1909 and Windows Server versions 1903 and 1909 to install patches, and states, "We recommend customers install updates as soon as possible as publicly disclosed vulnerabilities have the potential to be leveraged by bad actors ... An update for this vulnerability was released in March [2020], and customers who have installed the updates, or have automatic updates enabled, are already protected."[3] Workarounds, according to Microsoft, such as disabling SMB compression and blocking port 445, may help but may not be sufficient.[3]

According to the advisory division of Homeland Security, "Malicious cyber actors are targeting unpatched systems with the new [threat], ... [and] strongly recommends using a firewall to block server message block ports from the internet and to apply patches to critical- and high-severity vulnerabilities as soon as possible."[3]

References

[edit]
  1. ^ a b c d e Hammond, Jordan (11 March 2020). "CVE-2020-0796: Understanding the SMBGhost Vulnerability". PDQ.com. Retrieved 12 June 2020.
  2. ^ a b Seals, Tara (8 June 2020). "SMBGhost RCE Exploit Threatens Corporate Networks". ThreatPost.com. Retrieved 10 June 2020.
  3. ^ a b c d e f Grad, Peter (9 June 2020). "Homeland Security warns of Windows worm". TechXplore.com. Retrieved 10 June 2020.
  4. ^ "Home - MalwareHunterTeam". malwarehunterteam.com.
  5. ^ a b Gatlan, Sergiu (20 April 2020). "Windows 10 SMBGhost RCE exploit demoed by researchers". Bleeping Computer. Retrieved 12 June 2020.
  6. ^ Staff (13 March 2020). "CVE-2020-0796 - Windows SMBv3 Client/Server Remote Code Execution Vulnerability". Microsoft. Retrieved 12 June 2020.
  7. ^ Staff (15 March 2020). "CoronaBlue / SMBGhost Microsoft Windows 10 SMB 3.1.1 Proof Of Concept". Packet Storm. Retrieved 10 June 2020.
  8. ^ a b Chompie1337 (8 June 2020). "SMBGhost RCE PoC". GitHub. Retrieved 10 June 2020.{{cite news}}: CS1 maint: numeric names: authors list (link)
  9. ^ Murphy, David (10 June 2020). "Update Windows 10 Now to Block 'SMBGhost'". LifeHacker.com. Retrieved 10 June 2020.
  10. ^ Ilascu, Ionut (5 June 2020). "Windows 10 SMBGhost bug gets public proof-of-concept RCE exploit". Bleeping Computer. Retrieved 17 June 2020.
[edit]