ExtraHop named a Leader in the 2025 Forrester Wave™: Network Analysis And Visibility Solutions

Search
  • Platformchevron right
  • Solutionschevron right
  • Modern NDRchevron right
  • Resourceschevron right
  • Companychevron right

DETECTION OVERVIEW

SMBv1 Exploit - CVE-2020-1301

Risk Factors

The SMBLost exploit is publicly available and well known. An attacker must obtain authentication credentials or bypass authentication with a secondary exploit, then deliver a specially-designed packet for this attack. A successful exploit can result in a system crash or possibly remote code execution (RCE), which could ultimately give the remote attacker complete control of a device.

Category

Exploitation
Detection diagram
Next in Exploitation: SQL Injection Activity (HTTP Query)

Attack Background

SMBLost is an integer underflow vulnerability in Microsoft Server Message Block 1.0 (SMBv1). After obtaining user credentials, or bypassing authentication altogether with a secondary exploit, the attacker sends a specially-designed request that includes the NT_TRANSACT_IOCTL command (function number 0xa0) and the FSCTL_SIS_COPYFILE sub-command (FSCTL/IOCTL function number 0X90100). The FSCTL_SIS_COPYFILE command contains parameters for copying a file through a single-instance-store (SIS) link. The command also includes the name and length of the destination file. To exploit the vulnerability, the attacker sets the DestinationFileName to one byte and then sets the DestinationFileNameLength parameter to a value of 1. The SMB protocol does not reject the invalid DestinationFileNameLength, but incorrectly sets the destination file name length to MAXINT and attempts to copy MAXINT bytes of the destination file name into the destination buffer. The most likely result of this exploit is a system crash, but a skilled attacker can manipulate the destination file name to enable RCE.

Mitigation Options

MITRE ATT&CK ID

Associated content

Announcing The Forrester Wave™: Network Analysis And Visibility Solutions, Q4 2025

Network analysis and visibility solutions remain underrepresented in enterprises. Find out why in this preview of a new Wave report.

Report

ExtraHop® Named a Leader in First-Ever Gartner® Magic Quadrant™ for Network Detection and Response — ExtraHop

ExtraHop® Named a Leader in First-Ever Gartner® Magic Quadrant™ for Network Detection and Response

News

Detections

Visit this resource for more information.

Docs

The 2025 ExtraHop Global Threat Landscape Report: The Alarming Reality of Threat Actor Dwell Time and Deeper Network Access — ExtraHop

This analysis exposes the critical link between an organization's lack of internal visibility and the escalating cost of compromise, demanding an urgent re-evaluation of how core business assets are protected.

Blog

ExtraHop RevealX MITRE ATT&CK Coverage 2024 — ExtraHop

Learn why you need to be wary of the claims certain network detection and response providers make about their coverage against the MITRE ATT&CK framework.

Blog

MITRE ATT&CK - Network Detection & Response with RevealX — ExtraHop

Learn how NDR from RevealX helps security teams detect and investigate more adversary TTPs in the MITRE ATT&CK framework than rule-based tools.

External
Periodic Table of Use Cases

What else can RevealX do for you?