• Platformchevron right
  • Solutionschevron right
  • Modern NDRchevron right
  • Resourceschevron right
  • Companychevron right

DETECTION OVERVIEW

SMBv1 Exploit - CVE-2020-1301

Risk Factors

The SMBLost exploit is publicly available and well known. An attacker must obtain authentication credentials or bypass authentication with a secondary exploit, then deliver a specially-designed packet for this attack. A successful exploit can result in a system crash or possibly remote code execution (RCE), which could ultimately give the remote attacker complete control of a device.

Kill Chain

Exploitation

Risk Score

88

Detection diagram
Next in Exploitation: SQL Injection Activity (HTTP Query)

Attack Background

SMBLost is an integer underflow vulnerability in Microsoft Server Message Block 1.0 (SMBv1). After obtaining user credentials, or bypassing authentication altogether with a secondary exploit, the attacker sends a specially-designed request that includes the NT_TRANSACT_IOCTL command (function number 0xa0) and the FSCTL_SIS_COPYFILE sub-command (FSCTL/IOCTL function number 0X90100). The FSCTL_SIS_COPYFILE command contains parameters for copying a file through a single-instance-store (SIS) link. The command also includes the name and length of the destination file. To exploit the vulnerability, the attacker sets the DestinationFileName to one byte and then sets the DestinationFileNameLength parameter to a value of 1. The SMB protocol does not reject the invalid DestinationFileNameLength, but incorrectly sets the destination file name length to MAXINT and attempts to copy MAXINT bytes of the destination file name into the destination buffer. The most likely result of this exploit is a system crash, but a skilled attacker can manipulate the destination file name to enable RCE.

Mitigation Options

MITRE ATT&CK ID

What else can RevealX do for you?