PT-2020-1764 · Microsoft · Server Message Block +3

Published

2020-03-10

·

Updated

2025-09-22

·

CVE-2020-0796

CVSS v3.1
10
VectorAV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
Name of the Vulnerable Software and Affected Versions Microsoft Server Message Block (SMB) version 3.1.1 Microsoft Windows 10 versions 1903 through 1909 Microsoft Windows Server (affected versions not specified)
Description A remote code execution issue exists in the way the Microsoft Server Message Block 3.1.1 (SMBv3) protocol handles certain requests. This issue allows remote attackers to execute arbitrary code and affect the system. The vulnerability, also known as 'Windows SMBv3 Client/Server Remote Code Execution Vulnerability' or 'SMBGhost', is considered wormable and affects version 3.1.1 of Microsoft’s SMB file-sharing system.
Recommendations For Microsoft Server Message Block (SMB) version 3.1.1: Disable SMB compression and block SMB (port 137, 139, 445) inbound/outbound to avoid attacks. For Microsoft Windows 10 versions 1903 through 1909: Apply the patch released by Microsoft to fix the issue. For Microsoft Windows Server: Apply the patch released by Microsoft to fix the issue, or follow the same mitigation measures as for SMB version 3.1.1 if a patch is not available.

Exploit

Fix

RCE

Buffer Overflow

Weakness Enumeration

Related Identifiers

BDU:2020-01005
CVE-2020-0796

Affected Products

Server Message Block
Windows
Windows 10
Windows Server