Movatterモバイル変換


[0]ホーム

URL:


Jump to content
WikipediaThe Free Encyclopedia
Search

SMBGhost

From Wikipedia, the free encyclopedia
Security vulnerability

SMBGhost
CVE identifier(s)CVE-2020-0796[1]
Date discovered4 November 2019; 5 years ago (2019-11-04)[1] (note: date cve "assigned")
Date patched10 March 2020[1][2][3]
DiscovererMalware Hunter Team[4][1]
Affected softwareWindows 10 version 1903 and 1909, and Server Core installations of Windows Server, versions 1903 and 1909[5]

SMBGhost (orSMBleedingGhost orCoronaBlue) is a type ofsecurity vulnerability, withwormlike features, that affectsWindows 10 computers and was first reported publicly on 10 March 2020.[1][2][3][5][6][7][8][9]

Security vulnerability

[edit]

Aproof of concept (PoC)exploit code was published 1 June 2020 onGitHub by a security researcher.[8][10] The code could possibly spread to millions of unpatched computers, resulting in as much as tens of billions of dollars in losses.[3]

Microsoft recommends all users of Windows 10 versions 1903 and 1909 and Windows Server versions 1903 and 1909 to install patches, and states, "We recommend customers install updates as soon as possible as publicly disclosed vulnerabilities have the potential to be leveraged by bad actors ... An update for this vulnerability was released in March [2020], and customers who have installed the updates, or have automatic updates enabled, are already protected."[3] Workarounds, according to Microsoft, such as disabling SMB compression and blocking port 445, may help but may not be sufficient.[3]

According to the advisory division ofHomeland Security, "Malicious cyber actors are targeting unpatched systems with the new [threat], ... [and] strongly recommends using a firewall to block server message block ports from the internet and to apply patches to critical- and high-severity vulnerabilities as soon as possible."[3]

References

[edit]
  1. ^abcdeHammond, Jordan (11 March 2020)."CVE-2020-0796: Understanding the SMBGhost Vulnerability".PDQ.com. Retrieved12 June 2020.
  2. ^abSeals, Tara (8 June 2020)."SMBGhost RCE Exploit Threatens Corporate Networks".ThreatPost.com. Retrieved10 June 2020.
  3. ^abcdefGrad, Peter (9 June 2020)."Homeland Security warns of Windows worm".TechXplore.com. Retrieved10 June 2020.
  4. ^"Home - MalwareHunterTeam".malwarehunterteam.com.
  5. ^abGatlan, Sergiu (20 April 2020)."Windows 10 SMBGhost RCE exploit demoed by researchers".Bleeping Computer. Retrieved12 June 2020.
  6. ^Staff (13 March 2020)."CVE-2020-0796 - Windows SMBv3 Client/Server Remote Code Execution Vulnerability".Microsoft. Retrieved12 June 2020.
  7. ^Staff (15 March 2020)."CoronaBlue / SMBGhost Microsoft Windows 10 SMB 3.1.1 Proof Of Concept".Packet Storm. Retrieved10 June 2020.
  8. ^abChompie1337 (8 June 2020)."SMBGhost RCE PoC".GitHub. Retrieved10 June 2020.{{cite news}}: CS1 maint: numeric names: authors list (link)
  9. ^Murphy, David (10 June 2020)."Update Windows 10 Now to Block 'SMBGhost'".LifeHacker.com. Retrieved10 June 2020.
  10. ^Ilascu, Ionut (5 June 2020)."Windows 10 SMBGhost bug gets public proof-of-concept RCE exploit".Bleeping Computer. Retrieved17 June 2020.

External links

[edit]
Hacking in the 2020s
← 2010sTimeline2030s →
Major incidents
2020
2021
2022
2023
2024
Groups
Individuals
Majorvulnerabilities
publiclydisclosed
Malware
2020
2021
2022
Portals:
Retrieved from "https://en.wikipedia.org/w/index.php?title=SMBGhost&oldid=1216776591"
Categories:
Hidden categories:

[8]ページ先頭

©2009-2025 Movatter.jp