PT-2020-1764 · Microsoft · Windows Server +3
Published
2020-03-10
·
Updated
2025-08-26
·
CVE-2020-0796
10
Critical
Base vector | Vector | AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H |
Name of the Vulnerable Software and Affected Versions:
Microsoft Windows versions prior to the fixed version, specifically versions 3.1.1 of the Microsoft Server Message Block (SMB) protocol, including Microsoft Windows 10 (1903, 1909) and Microsoft Windows Server.
Description:
A remote code execution vulnerability exists in the way the Microsoft Server Message Block 3.1.1 (SMBv3) protocol handles certain requests. This vulnerability, also known as 'Windows SMBv3 Client/Server Remote Code Execution Vulnerability', allows remote attackers to execute arbitrary code and affect the system. The issue is related to the incorrect handling of compression requests in the SMBv3 protocol. To mitigate the risk, it is recommended to disable SMB compression and block SMB ports (137, 139, 445) inbound and outbound.
Recommendations:
For Microsoft Windows 10 (1903, 1909) and Microsoft Windows Server, update to a version that includes the fix for this vulnerability.
As a temporary workaround, consider disabling SMB compression to prevent exploitation until a patch is available.
Restrict access to SMB ports (137, 139, 445) to minimize the risk of exploitation.
Exploit
Fix
RCE
Buffer Overflow
Weakness Enumeration
Related Identifiers
Affected Products
References · 172
- 🔥 https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/windows/local/cve_2020_0796_smbghost.rb⭐ 34266 🔗 14003 · Exploit
- 🔥 https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/windows/smb/cve_2020_0796_smbghost.rb⭐ 34266 🔗 14003 · Exploit
- 🔥 https://github.com/chompie1337/SMBGhost_RCE_PoC⭐ 1321 🔗 348 · Exploit
- 🔥 https://github.com/danigargu/CVE-2020-0796⭐ 1304 🔗 343 · Exploit
- 🔥 https://github.com/ly4k/SMBGhost⭐ 666 🔗 199 · Exploit
- 🔥 https://github.com/ollypwn/SMBGhost⭐ 666 🔗 197 · Exploit
- 🔥 https://github.com/ZecOps/CVE-2020-0796-RCE-POC⭐ 539 🔗 170 · Exploit
- 🔥 https://github.com/jamf/CVE-2020-0796-RCE-POC⭐ 539 🔗 170 · Exploit
- 🔥 https://github.com/eerykitty/CVE-2020-0796-PoC⭐ 321 🔗 121 · Exploit
- 🔥 https://github.com/jamf/CVE-2020-0796-LPE-POC⭐ 240 🔗 86 · Exploit
- 🔥 https://github.com/ZecOps/CVE-2020-0796-LPE-POC⭐ 240 🔗 85 · Exploit
- 🔥 https://github.com/Barriuso/SMBGhost_AutomateExploitation⭐ 270 🔗 51 · Exploit
- 🔥 https://github.com/ZecOps/CVE-2020-0796-POC⭐ 85 🔗 33 · Exploit
- 🔥 https://github.com/Rvn0xsy/CVE_2020_0796_CNA⭐ 78 🔗 22 · Exploit
- 🔥 https://github.com/rsmudge/CVE-2020-0796-BOF⭐ 68 🔗 22 · Exploit