Azure ATP now detects SMBGhost

Published 04-06-2020 09:22 AM 9,966 Views

This post is authored by Mor Rubin, Security Researcher, Azure ATP.


The SMB vulnerability CVE-2020-0796, also known as “SMBGhost” or “CoronaBlue”, was published a few days ago. This CVE is about a potential remote code execution due to a buffer overflow vulnerability in the way SMBv3 (3.1.1) handles SMBv2 compression requests. The vulnerability affects Windows 10 and Windows Server 2019 versions 1903 and 1909.


A few proofs of concept that trigger this vulnerability have been published already – one them on GitHub. So far, the tools published online are expected to cause a “blue screen” if the target Windows server is vulnerable to this issue. As most of the critical servers in an organization are Windows servers, attackers will exploit this vulnerability to try to gain control of the remote servers without authenticating.


The vulnerability has the potential to become widely spread, similar to the way EternalBlue exploited the SMB protocol in 2017. It’s important to protect critical Windows servers by installing a patch, KB4551762, or following other suggested mitigations and workarounds.


In addition, to help our customers stay secure, we are releasing a new Azure ATP detection that looks for use of this vulnerability on unpatched Domain Controllers. The detection identifies crafted packets attempting to exploit SMBv3.


Get Started Today

Azure ATP leverages your Active Directory signals, the cloud intelligence underpinning all Microsoft’s security services, and identity-focused detections updated at cloud scale to prevent, detect, and investigate identity-based threats, compromised and malicious users, and lateral movement of on-premises attacks.


Super Contributor

It's nice and dandy, but sounds a bit weird that MS by letting that nasty vulnerability in their newest and "safest" version of Windows 10 through now sells this as a feature in ATP.

Occasional Contributor

@Oleg K Microsoft has patched the vulnerability in 2 days. Get the latest updates and you should be good. ATP will detect it on unpatched machines. 

New Contributor

What about Advanced Threat Analytics (ATA), the on-premise version of ATP; will that get this capability? Not everyone wants an ATP subscription.


@Mirza Dedic  thanks for questions, it is currently available in Azure ATP only.  

Version history
Last update:
‎May 11 2021 01:59 PM
Updated by: