• Platformchevron right
  • Solutionschevron right
  • Modern NDRchevron right
  • Resourceschevron right
  • Companychevron right

DETECTION OVERVIEW

Windows 10 SMBv3 Exploit Attempt - CVE-2020-0796

Risk Factors

An attacker with network access to an affected Windows 10 device can exploit this Microsoft Server Message Block 3.1.1 (SMBv3) vulnerability. A highly skilled attacker must create a specially-designed SMBv3 packet that bypasses Windows safeguards. If successful, an unauthenticated attacker can have a large impact by creating a denial-of-service (DoS) scenario or running arbitrary code to gain complete control of a device.

Kill Chain

Exploitation

Risk Score

94

Detection diagram
Next in Exploitation: Windows CryptoAPI ECC Validation Vulnerability - CVE-2020-0601

Attack Background

With this type of attack, the attacker creates a specially-designed SMBv3 packet with modified parameter values about the compressed data size of the payload and offset. The victim device only allocates a small amount of memory based on these values (1), and the victim ends up overwriting items in kernel memory with the malicious payload (2). The results vary depending on the attacker's objective: the attacker can cause a denial-of-service (DoS) by completely crashing the device or they can run arbitrary code in the kernel.

Mitigation Options

Install relevant patches for affected software and server versions

Disable SMBv3 compression if unable to apply the patch

Block TCP traffic on port 445 at the network perimeter

MITRE ATT&CK ID

What else can RevealX do for you?