A patch for Windows 10 file sharing protocol vulnerability will be released


by Christiaan Colen

Microsoft has released an emergency update for a vulnerability in the process of handling certain requests in the Server Message Block version 3.1.1 (SMBv3) file sharing protocol.

CVE-2020-0796 | Windows SMBv3 Client / Server Remote Code Execution Vulnerability
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0796

March 12, 2020—KB4551762 (OS Builds 18362.720 and 18363.720)
https://support.microsoft.com/ja-jp/help/4551762/windows-10-update-kb4551762

Patch now! Microsoft releases fixes for the serious SMB bug CVE-2020-0796 – Sophos News
https://news.sophos.com/en-us/2020/03/12/patch-tuesday-for-march-2020-fixes-the-serious-smb-bug-cve-2020-0796/

The perceived vulnerability was 'Ability to execute code remotely on an SMBv3 server or client.' The affected Windows versions are Windows 10 versions 1903 and 1909, Windows Server versions 1903 and 1909, and severity Critical (Emergency).

The details of this vulnerability and how it was discovered are reported below.

Vulnerability of severity `` emergency '' in file sharing protocol of Windows 10, patch is being prepared, but there is a workaround-gigazine


by DobaKung

It was pointed out that exploiting this vulnerability could infect a large-scale network with a worm virus , which is dangerous. Microsoft said that 'there is no evidence that the flaw is being actively exploited,' but the risk was 'urgent' as 'highly likely to be exploited.'

On March 12, 2020 local time, Microsoft released an emergency update, KB4551762, that addresses the vulnerability. When applying, it is strongly recommended that the latest service stack update program (SSU) be installed on each OS first, but when updating via Windows Update, the latest SSU ( KB4541338 ) is automatically applied Will be

The standalone version 'KB4551762' is available from:

Microsoft Update Catalog
http://www.catalog.update.microsoft.com/Search.aspx?q=KB4551762



Sophos, a cybersecurity company, argued that `` various attack scenarios such as privilege escalation attacks are possible, and in the worst case, an attacker can do anything on a machine. '' The most important fix in this month's patch release. ' 'Please patch it anyway!'

in Software,   Security, Posted by darkhorse_log