{"id":3633,"date":"2020-04-02T14:41:07","date_gmt":"2020-04-02T14:41:07","guid":{"rendered":"https:\/\/blog.gridinsoft.com\/?p=3633"},"modified":"2020-04-02T14:41:07","modified_gmt":"2020-04-02T14:41:07","slug":"specialists-published-poc-exploits-for-smbghost-vulnerability","status":"publish","type":"post","link":"https:\/\/gridinsoft.com\/blogs\/specialists-published-poc-exploits-for-smbghost-vulnerability\/","title":{"rendered":"Specialists published PoC exploits for SMBGhost vulnerability"},"content":{"rendered":"<h4>The March &#8220;Tuesday of updates&#8221; did not include a patch for the vulnerability CVE-2020-0796, information about which was mistakenly published by experts from Cisco Talos and Fortinet in the public domain. Recently, security professionals published PoC exploits for this vulnerability called SMBGhost.<\/h3>\n<p><\/em><\/p>\n<p>Problem <strong>CVE-2020-0796<\/strong>, also called SMBGhost, <a href=\"https:\/\/adware.guru\/new-smbv3-bug-on-windows-has-worm-potential\/\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">affects SMBv3<\/a>, though Windows 10 1903, Windows 10 1909, Windows Server 1903, and Windows Server 1909 are also vulnerable to the bug.<\/p>\n<p>Let me remind you that the SMB protocol a few years ago helped the distribution of WannaCry and NotPetya around the world. Recently Microsoft <a href=\"\/blogs\/microsoft-recommends-exchange-administrators-to-disable-smbv1\/\" rel=\"noopener noreferrer\" target=\"_blank\">strongly recommended<\/a> disabling SMBv1 in Microsoft Exchange, as it cannot come up with patches for this protocol.<\/p>\n<p>Last month, Kryptos Logic experts estimated that <a href=\"https:\/\/twitter.com\/kryptoslogic\/status\/1238069159919063050\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">about 48,000 hosts<\/a> with an open SMB port, which are vulnerable to potential attacks with a new bug, can be found on the Internet.<\/p>\n<blockquote><p>\u201cThe vulnerability is a buffer overflow on Microsoft SMB servers. The problem manifests when the vulnerable software processes a malicious compressed data packet. A remote and unauthenticated attacker can use this to execute arbitrary code in the application context\u201d, &#8211; say Fortinet experts.<\/p><\/blockquote>\n<p>A similar description of the problem was published and then removed from the Cisco Talos blog. The company claimed that \u201cexploiting the vulnerability opens up systems for attacks with worm potential,\u201d meaning the problem could easily spread from victim to victim.<\/p>\n<p>Due to a leak in mid-March, Microsoft engineers were forced to urgently prepare an extraordinary patch for this vulnerability. The hotfix is available as <a href=\"https:\/\/support.microsoft.com\/en-us\/help\/4551762\/windows-10-update-kb4551762\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">KB4551762<\/a> for Windows 10, versions 1903 and 1909, as well as Windows Server 2019 versions 1903 and 1909.<\/p>\n<p>Researchers have now created and published tools that can be used to find vulnerable servers, and have also <a href=\"https:\/\/github.com\/ZecOps\/CVE-2020-0796-LPE-POC\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">released PoC<\/a> exploits that help achieve denial of service (DoS).<\/p>\n<p>While PoC for remote code execution has not yet been published due to its danger, ZecOps experts have developed and released PoC, which demonstrates how SMBGhost can be used to elevate privileges to SYSTEM. Additionally, ZecOps researchers published a blog report <a href=\"https:\/\/blog.zecops.com\/vulnerabilities\/exploiting-smbghost-cve-2020-0796-for-a-local-privilege-escalation-writeup-and-poc\/\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">with the technical details<\/a> of an attack on local privilege escalation.<\/p>\n<p>Independent experts <strong>Daniel Garcia Gutierrez<\/strong> and <strong>Manuel Blanco Parajon<\/strong> presented another <a href=\"https:\/\/github.com\/danigargu\/CVE-2020-0796\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">similar exploit<\/a> for SMBGhost.<\/p>\n<p>Experts remind users about importance for timely installation of updates, since the appearance of an RCE-exploit in the public domain is definitely not far.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The March &#8220;Tuesday of updates&#8221; did not include a patch for the vulnerability CVE-2020-0796, information about which was mistakenly published by experts from Cisco Talos and Fortinet in the public domain. Recently, security professionals published PoC exploits for this vulnerability called SMBGhost. Problem CVE-2020-0796, also called SMBGhost, affects SMBv3, though Windows 10 1903, Windows 10 [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":3635,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"content-type":"","_sitemap_exclude":false,"_sitemap_priority":"","_sitemap_frequency":"","footnotes":""},"categories":[15],"tags":[],"class_list":{"0":"post-3633","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-security-news"},"featured_image_src":"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2020\/04\/ghostbusters.jpg","author_info":{"display_name":"Vladimir Krasnogolovy","author_link":"https:\/\/gridinsoft.com\/blogs\/author\/krasnogolovy\/"},"_links":{"self":[{"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/posts\/3633","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/comments?post=3633"}],"version-history":[{"count":0,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/posts\/3633\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/media\/3635"}],"wp:attachment":[{"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/media?parent=3633"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/categories?post=3633"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/tags?post=3633"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}