Ad End 1 August 2025
Ad Ends 13 July 2025
ad End 25 October 2025
Ad Ends 20 April 2025
Ad expire at 5 August 2024
banner Expire 9 June 2025
banner Expire 25 October 2025
banner Expire 10 May 2025
What's new
Wizard's shop 2.0
Money Club cc shop
banner Expire 15 January 2025
banner Expire 20 October 2024
UniCvv
Yale Lodge
Kfc CLub
adv exp at 30 July 2025
Carding.pw carding forum
BidenCash Shop

CISA warns of attacks using SMBGhost vulnerability

Mr.Smith

Well-known member
Joined
Jun 14, 2020
Messages
82
Reaction score
13
Points
107
Awards
1
  • First post
Various malware operators used SMBGhost to remotely execute code.




The US Cybersecurity and Infrastructure Security Agency (CISA) has warned Windows users that the recently published PoC exploit for the worm-like vulnerability in Windows 10 ( CVE-2020-0796 ) is being used to carry out attacks.

SMBGhost, also known as CoronaBlue, is a vulnerability that affects the Microsoft Server Message Block 3.1.1 (SMBv3) version of the network data transfer protocol. The vulnerability affects Windows 10 and Windows Server and can be used for DoS attacks, increasing local privileges and executing arbitrary code on the system.

To carry out attacks on SMB servers, an attacker needs to send malicious packets to the target system. The culprit must also trick the victim into connecting to a malicious SMB server.

Microsoft announced the vulnerability, and then released patches and preventive measures to exploit the vulnerability in March this year. Researchers began publishing PoC exploits for the vulnerability shortly after it was discovered, but they focused only on DoS attacks or privilege escalation. Several companies and researchers claimed to have developed PoC codes to exploit vulnerabilities that could allow remote code execution, but not one was made public.

However, last week a researcher using the pseudonym Chompie publishedPoC exploit for SMBGhost, allowing remote code execution. According to Chompie, it is not 100% reliable and can lead to a malfunction of the system, however, several experts who tested the exploit confirmed that remote code execution can be performed.

CISA recommended that users and administrators install patches for SMBGhost and block SMB ports using a firewall and warned that the vulnerability was being exploited by criminals.
__________________

What is an "Automatic Guarantor Service"?
 
Ad End 1 February 2024
Top