A patch for Windows 10 file sharing protocol vulnerability will be released
by Christiaan Colen
Microsoft has released an emergency update for a vulnerability in the process of handling certain requests in the Server Message Block version 3.1.1 (SMBv3) file sharing protocol.
CVE-2020-0796 | Windows SMBv3 Client / Server Remote Code Execution Vulnerability
March 12, 2020—KB4551762 (OS Builds 18362.720 and 18363.720)
Patch now! Microsoft releases fixes for the serious SMB bug CVE-2020-0796 – Sophos News
The perceived vulnerability was 'Ability to execute code remotely on an SMBv3 server or client.' The affected Windows versions are Windows 10 versions 1903 and 1909, Windows Server versions 1903 and 1909, and severity Critical (Emergency).
The details of this vulnerability and how it was discovered are reported below.
Vulnerability of severity `` emergency '' in file sharing protocol of Windows 10, patch is being prepared, but there is a workaround-gigazine
It was pointed out that exploiting this vulnerability could infect a large-scale network with a worm virus , which is dangerous. Microsoft said that 'there is no evidence that the flaw is being actively exploited,' but the risk was 'urgent' as 'highly likely to be exploited.'
On March 12, 2020 local time, Microsoft released an emergency update, KB4551762, that addresses the vulnerability. When applying, it is strongly recommended that the latest service stack update program (SSU) be installed on each OS first, but when updating via Windows Update, the latest SSU ( KB4541338 ) is automatically applied Will be
The standalone version 'KB4551762' is available from:
Microsoft Update Catalog
Sophos, a cybersecurity company, argued that `` various attack scenarios such as privilege escalation attacks are possible, and in the worst case, an attacker can do anything on a machine. '' The most important fix in this month's patch release. ' 'Please patch it anyway!'