Showing posts with label SMBGhost. Show all posts
Showing posts with label SMBGhost. Show all posts

Severity Rating: High
Systems Affected

·        Windows 10 Version 1903 for 32-bit Systems
·        Windows 10 Version 1903 for ARM64-based Systems
·        Windows 10 Version 1903 for x64-based Systems
·        Windows 10 Version 1909 for 32-bit Systems
·        Windows 10 Version 1909 for ARM64-based Systems
·        Windows 10 Version 1909 for x64-based Systems
·        Windows 10 Version 2004 for 32-bit Systems
·        Windows 10 Version 2004 for ARM64-based Systems
·        Windows 10 Version 2004 for x64-based Systems
·        Windows Server, version 1903 (Server Core installation)
·        Windows Server, version 1909 (Server Core installation)
·        Windows Server, version 2004 (Server Core installation)

Overview
A vulnerability has been reported in Microsoft Server Message Block Server
that could allow a remote attacker to access sensitive information on the
targeted system. 
Description
This vulnerability exists in the way that the Microsoft Server Message
Block 3.1.1 (SMBv3) protocol handles certain requests. A remote attacker
could exploit this vulnerability by sending a specially crafted packet to a
targeted SMBv3 server. Successful exploitation of this vulnerability could
allow the attacker to access sensitive information on the targeted system.

Note:
This vulnerability exists in the same function as with SMBGhost
(CVE-2020-0796, CIVN-2020-0048) vulnerability.

Solution
Apply appropriate software updates as mentioned in the Microsoft advisory

- -1206

Vendor Information

- -1206

References

Zecops

bleed-cve-2020-1206-with-smbghost/

Tenable


CVE Name

CVE-2020-1206

© Copyright 2020. Designed By Templateify

© Copyright 2020. Ud64

Scroll to Top