Remote Code Execution SMBGhost for Microsoft SMBv3 now being chained with SMBleed
The CVE-2020-1206 (SMBleed) vulnerability allows an attacker to leak information remotely.
This can be achieved with the use of a command shell gained through CVE-2020-0796 (SMBGhost) allowing an attacker to perform the second attack to leak information.
A Proof-of-Concept has been released (by the ZecOPS research team) on how to enable an information disclosure vulnerability within the SMBv3 protocol, impacting Windows servers or clients.
Earlier this year, the CVE-2020-0796 was discovered which could allow remote code execution due to the way Microsoft Server Message Block 3.1.1 handled it's connections that use compression. Within the same function Srv2DecompressData in the SMB server driver a new vulnerability was discovered. To exploit CVE-2020-1206 an attacker would need credentials and a writable share. Due to the bug affecting every message it could potentially be exploited without authentication. This leads to the impacted systems leaking kernel memory information.
Patches were released to resolve these vulnerabilities.
CERT.be recommends installing all latest updates for the affected Windows versions, they can be found on the official Microsoft Portal. Please find the appropriate update for the Remote Code Execution here and the Information Disclosure vulnerability here.