SMBGhost Attacks Spotted Following Release of Code Execution PoC

The U.S. Department of Homeland Security’s Cybersecurity and Infrastructure Security Agency (CISA) has warned Windows users that a recently released proof-of-concept (PoC) exploit for the vulnerability tracked as SMBGhost has been abused to launch attacks.


SMBGhost, also known as CoronaBlue and tracked as CVE-2020-0796, is a vulnerability related to Server Message Block 3.0 (SMBv3), specifically to how SMB 3.1.1 handles certain requests. The flaw affects Windows 10 and Windows Server and it can be exploited for denial-of-service (DoS) attacks, local privilege escalation, and arbitrary code execution.


In attacks aimed at SMB servers, the attacker needs to send malicious packets to the targeted system. In the case of clients, the hacker has to convince the victim to connect to a malicious SMB server.


When it disclosed the vulnerability, Microsoft warned that it’s wormable, which makes it particularly dangerous. The company released patches and workarounds in March.


Researchers started releasing PoC exploits for CVE-2020-0796 shortly after its disclosure, but the exploits only achieved DoS or privilege escalation. Several companies and researchers claimed to have developed exploits that achieved remote code execution, but none of them were made public.


However, last week, a researcher who uses the online moniker Chompie released an SMBGhost exploit for remote code execution. The researcher released it for “educational purposes,” arguing that cybersecurity firm ZecOps was about to release its PoC in the coming days and the patch has been ..

Support the originator by clicking the read the rest link below.