DISCLOSURE FUBAR –
Critical bug in Microsoft’s SMBv3 implementation published under mysterious circumstances.
The vulnerability exists in version 3.1.1 of the Server Message Block 3.1.1 that’s used to share files, printers, and other resources on local networks and over the Internet. Attackers who successfully exploit the flaw can execute code of their choice on both servers and end-user computers that use the vulnerable protocol, Microsoft said in this bare-bones advisory .
The flaw, which is tracked as CVE – – , affects Windows and Windows Server , which are relatively new releases that Microsoft has invested huge amounts of resources hardening against precisely these types of attacks. Patches aren’t available, and Tuesday’s advisory gave no timeline for one being released. Asked if there was a timeline for releasing a fix, a Microsoft representative said: “Beyond the advisory you linked, nothing else to share from Microsoft at this time.”
In the meantime, Microsoft said vulnerable servers can be protected by disabling compression to block unauthenticated attackers from exploiting the vulnerability against an SMBv3 server. Users can use the following PowerShell command to turn off compression without needing to reboot the machine:
Set-ItemProperty -Path "HKLM: SYSTEM CurrentControlSet Services LanmanServer Parameters" DisableCompression -Type DWORD -Value 1 -Force
That fix won’t protect vulnerable client computers from attack. Microsoft also recommended users block port 728, which is used to send SMB traffic between machines.
Now you see it, now you don't
An advisory published — and then removed — by security firm Fortinet described the vulnerability as “MS.SMB.Server.Compression .Transform.Header.Memory.Corruption. ” The pulled advisory said the flaw is the result of a
buffer overflow in vulnerable Microsoft SMB servers.
“The vulnerability is due to an error when the vulnerable software handles a maliciously crafted compressed data packet,” Fortinet researchers wrote . “A remote, unauthenticated attacker can exploit this to execute arbitrary code within the context of the application.”
Cisco’s Talos security team also published — and later pulled — its own advisory. It called the vulnerability “wormable,” meaning a single exploit could touch off a chain reaction that allows attacks to spread from vulnerable machine to vulnerable machine without requiring any interaction from admins or users.
“An attacker could exploit this bug by sending a specially crafted packet to the target SMBv3 server, which the victim needs to be connected to, ”the removed Talos post said. “Users are encouraged to disable SMBv3 compression and block TCP port on firewalls and client computers. The exploitation of this vulnerability opens systems up to a ‘wormable’ attack, which means it would be easy to move from victim to victim. ”
Microsoft’s implementation of SMBv3 introduces a variety of measures designed to make the protocol more secure on Windows computers. The update became more widely used after WannaCry and
NotPetya used an exploit developed by — and later stolen from — the National Security agency. Known as EternalBlue, the attack exploited SMBv1 to gain remote code execution and move from machine to machine. Microsoft has similarly hardened Windows and Server to better withstand exploits, especially those that would otherwise be wormable.
It’s not clear why Microsoft released the sparse details or why both Fortinet and Talos released and then pulled their advisories. The event came on Update Tuesday, which occurs on the second Tuesday of each month, when Microsoft releases a crop of patches to fix various security vulnerabilities.
While CVE – – is particularly serious , not everyone said it poses the kind of threat mounted by the SMBv1 flaw that was exploited by WannaCry and NotPetya. Those worms were fueled by the public release of EternalBlue , an exploit that was so reliable it made exploitation a copy-and-paste exercise. Another major contribution to the worms ’success was the near-ubiquity of the SMBv1 at the time. SMBv3, by contrast, is much less used.
SMB is also protected by kernel address space layout randomization
Jake Williams, a former NSA hacker and the founder of security firm Rendition Security, said in a Twitter thread that both those factors would likely buy vulnerable networks time.
“The TL; DR here is that this IS serious, but it isn’t WannaCry 2.0,” he wrote. “Fewer systems are impacted and there’s no readily available exploit code. I’m not thrilled about another SMB vuln, but we all knew this would come (and this won’t be the last). Hysteria is unwarranted though. ”
5. Even with trigger code, you still have to remotely bypass KASLR (not an easy task). If you need proof, look at BUCKEYE. They had the EternalBlue trigger, but had to chain it with another information disclosure vulnerability to gain code execution. This isn’t easy. 3 /
– Jake Williams (@MalwareJake) (March) ,
It’s also worth remembering that BlueKeep, the name of another wormable vulnerability Microsoft patched last May, has yet to be exploited widely — if at all — despite dire warnings it posed a serious risk to networks around the world.
The cause of the advisories being published and then pulled touched off a fair amount of speculation on Twitter. Microsoft commonly provides details about soon-to-be-released patches with makers of antivirus products and intrusion prevention systems. It’s possible Microsoft delayed release of the SMBv3 patch at the last minute, and these partners didn’t get word of it.
Whatever the cause, the cat is out of the bag now. Windows users who have SMBv3 exposed on the Internet would do well to heed Microsoft’s security advice as soon as possible.