February 29, 2020

159 words 1 min read

cve-2020-0796/cve-2020-0796

cve-2020-0796/cve-2020-0796

CVE-2020-0796 - a wormable SMBv3 vulnerability. How to work.

repo name cve-2020-0796/cve-2020-0796
repo link https://github.com/cve-2020-0796/cve-2020-0796
homepage
language Python
size (curr.) 27 kB
stars (curr.) 129
created 2020-03-11
license

CVE-2020-0796

To exploit the vulnerability against an SMB Server, an unauthenticated attacker could send a specially crafted packet to a targeted SMBv3 Server. To exploit the vulnerability against an SMB Client, an unauthenticated attacker would need to configure a malicious SMBv3 Server and convince a user to connect to it.

Workacounds: Disable SMBv3 compression: You can disable compression to block unauthenticated attackers from exploiting the vulnerability against an SMBv3 Server with the PowerShell command below.

  • Block TCP port 445 at the enterprise perimeter firewall
  • Follow Microsoft guidelines to prevent SMB traffic from lateral connections and entering or leaving the network Preventing SMB traffic from lateral connections and entering or leaving the network
  • Are older versions of Windows (other than what is listed in the Security Updates table) affected by this vulnerability?
comments powered by Disqus