Blog Post

Microsoft Security Blog
2 MIN READ

Azure ATP now detects SMBGhost

Tal Maor's avatar
Tal Maor
Icon for Microsoft rankMicrosoft
Apr 06, 2020

This post is authored by Mor Rubin, Security Researcher, Azure ATP.

 

The SMB vulnerability CVE-2020-0796, also known as “SMBGhost” or “CoronaBlue”, was published a few days ago. This CVE is about a potential remote code execution due to a buffer overflow vulnerability in the way SMBv3 (3.1.1) handles SMBv2 compression requests. The vulnerability affects Windows 10 and Windows Server 2019 versions 1903 and 1909.

 

A few proofs of concept that trigger this vulnerability have been published already – one them on GitHub. So far, the tools published online are expected to cause a “blue screen” if the target Windows server is vulnerable to this issue. As most of the critical servers in an organization are Windows servers, attackers will exploit this vulnerability to try to gain control of the remote servers without authenticating.

 

The vulnerability has the potential to become widely spread, similar to the way EternalBlue exploited the SMB protocol in 2017. It’s important to protect critical Windows servers by installing a patch, KB4551762, or following other suggested mitigations and workarounds.

 

In addition, to help our customers stay secure, we are releasing a new Azure ATP detection that looks for use of this vulnerability on unpatched Domain Controllers. The detection identifies crafted packets attempting to exploit SMBv3.

 

Get Started Today

Azure ATP leverages your Active Directory signals, the cloud intelligence underpinning all Microsoft’s security services, and identity-focused detections updated at cloud scale to prevent, detect, and investigate identity-based threats, compromised and malicious users, and lateral movement of on-premises attacks.

 

Updated May 11, 2021
Version 4.0

4 Comments

  • Mirza Dedic's avatar
    Mirza Dedic
    Brass Contributor

    What about Advanced Threat Analytics (ATA), the on-premise version of ATP; will that get this capability? Not everyone wants an ATP subscription.

  • wroot Microsoft has patched the vulnerability in 2 days. Get the latest updates and you should be good. ATP will detect it on unpatched machines. 

  • wroot's avatar
    wroot
    Silver Contributor

    It's nice and dandy, but sounds a bit weird that MS by letting that nasty vulnerability in their newest and "safest" version of Windows 10 through now sells this as a feature in ATP.