I’ll have more details about this shortly, but many of you admins are rightly concerned about the CVE-2020-0796 security hole, which was announced, th
[See the full post at: It looks like the announced-but-not-fixed CVE-2020-0796 “CoronaBlue” vuln is only for Server 2013 and 2019]
![]() |
There are isolated problems with current patches, but they are well-known and documented on this site. |
SIGN IN | Not a member? | REGISTER | PLUS MEMBERSHIP |
-
It looks like the announced-but-not-fixed CVE-2020-0796 “CoronaBlue” vuln is only for Server 2013 and 2019
Home » Forums » Newsletter and Homepage topics » It looks like the announced-but-not-fixed CVE-2020-0796 “CoronaBlue” vuln is only for Server 2013 and 2019
- This topic has 14 replies, 8 voices, and was last updated 5 years, 2 months ago.
Tags: CVE-2020-0796 SMBv3
AuthorTopicwoody
ManagerMarch 11, 2020 at 8:21 am #2189610Viewing 8 reply threadsAuthorReplies-
b
AskWoody_MVP -
woody
Manager
-
-
LoneWolf
AskWoody LoungerMarch 11, 2020 at 9:34 am #2189629It looks like the announced-but-not-fixed CVE-2020-0796 “CoronaBlue” vuln is only for Server 2013 and 2019
2013?
Ditto, I was wondering about this.
Server 2016 and 2019, perhaps?
We are SysAdmins.
We walk in the wiring closets no others will enter.
We stand on the bridge, and no malware may pass.
We engage in support, we do not retreat.
We live for the LAN.
We die for the LAN. -
steeviebops
AskWoody Plus -
jabeattyauditor
AskWoody Lounger -
woody
Manager
-
-
steeviebops
AskWoody PlusMarch 11, 2020 at 10:21 am #2189657If it only affects 1903 and 1909 then only Server 2019 would be affected. Server 2016 is based on 1607.
Hang on (can’t seem to edit my own post). Server 2019 is based on 1809 so shouldn’t be affected either. So would only be the Core 1903 and 1909 releases in that case.
-
anonymous
Guest -
anonymous
GuestMarch 11, 2020 at 12:21 pm #2189728The crazy part about this is that it affects the client as well.
To exploit the vulnerability against an SMB Server, an unauthenticated attacker could send a specially crafted packet to a targeted SMBv3 Server. To exploit the vulnerability against an SMB Client, an unauthenticated attacker would need to configure a malicious SMBv3 Server and convince a user to connect to it.
There’s a way to disable smb compression for servers, but not for clients. Surely even if there was a problem with the real patch, they could’ve shipped a patch that let us disable compression on the client side.
Can an attacker just replace a normal smb server with arp poisoning or something? SMB has session signatures, but it doesn’t have long-lasting certificates like an HTTPS site, does it? And the policy “Microsoft network client: Digitally sign communications (always)” is disabled by default.
Does a client have to log in to a specific share, or is browsing a computer’s shares with Network Discovery enough to exploit?
There way too much we don’t know.
I have now seen/talked to 3 different people claiming they found the bug in less than 5 minutes. I won’t be surprised if exploits pop up online by the end of the day.
I would not be surprised either. Buffer overflows are a simple exploit. Once it’s known one is out there, people can find them. This one is just hidden by a new/obscure smb compression extension.
The crypto bug the NSA found is similar, it’s just low-hanging fruit that could be gleamed from the wikipedia page of elliptic curve cryptography, or from a basic crypto lecture. Nobody would imagine that it would exist in a real implementation in 2020.
-
anonymous
GuestMarch 11, 2020 at 1:24 pm #2189746Can someone provide some advice for the common folk: being a home user, on a local network with 2 laptops that share a wireless printer, using a router, is this a concern? Do I need to disable SMBv3 compression, etc.? Running Gibson’s ShieldsUP shows all ports, including 445, as stealth. Currently on Win 10 1909. Just trying to figure out if I need to take any action or just wait on a patch from MS.
-
CraigS26
AskWoody PlusMarch 12, 2020 at 6:01 am #2190013Windows 10 running a C$ share would all be affected, wouldn’t it? The only Win10 1903/1909 installs not affected may be Home users (assuming they don’t share printers). Pro and higher will most likely have the exploit even if not on a domain.
IF 1909-64 Home users w/1-Printer ARE affected can someone clarify if the the Power Shell Cmd that is entered in SERVERS Admin Cmd Prompt applies, ALSO, to just Desktop users. All To-Do’s address Server environments yet 1909-64 Desktops are allegedly affected and nothing specifically is said about them.
Sorry for Double Post & missed clarification just above- Continue to WISH Edit lasted longer.
I see that PKC’s — And if you aren’t in charge of a network, sit back and smile. You have other things to worry about. — makes my question moot.
W10 Pro 22H2 / Hm-Stdnt Ofce '16 C2R / Macrium Pd vX / GP=2 + FtrU=Semi-Annual + Feature Defer = 1 + QU = 0
Viewing 8 reply threads -

Plus Membership
Donations from Plus members keep this site going. You can identify the people who support AskWoody by the Plus badge on their avatars.
AskWoody Plus members not only get access to all of the contents of this site -- including Susan Bradley's frequently updated Patch Watch listing -- they also receive weekly AskWoody Plus Newsletters (formerly Windows Secrets Newsletter) and AskWoody Plus Alerts, emails when there are important breaking developments.
Get Plus!
Welcome to our unique respite from the madness.
It's easy to post questions about Windows 11, Windows 10, Win8.1, Win7, Surface, Office, or browse through our Forums. Post anonymously or register for greater privileges. Keep it civil, please: Decorous Lounge rules strictly enforced. Questions? Contact Customer Support.
Search Newsletters
Search Forums
View the Forum
Search for Topics
Recent Topics
-
Office gets current release
by
Susan Bradley
2 hours, 14 minutes ago -
FBI: Still Using One of These Old Routers? It’s Vulnerable to Hackers
by
Alex5723
3 hours, 51 minutes ago -
Windows AI Local Only no NPU required!
by
RetiredGeek
35 minutes ago -
Stop the OneDrive defaults
by
CWBillow
4 hours, 40 minutes ago -
Windows 11 Insider Preview build 27868 released to Canary
by
joep517
14 hours, 35 minutes ago -
X Suspends Encrypted DMs
by
Alex5723
16 hours, 47 minutes ago -
WSJ : My Robot and Me AI generated movie
by
Alex5723
17 hours, 5 minutes ago -
Botnet hacks 9,000+ ASUS routers to add persistent SSH backdoor
by
Alex5723
17 hours, 42 minutes ago -
OpenAI model sabotages shutdown code
by
Cybertooth
18 hours, 19 minutes ago -
Backup and access old e-mails after company e-mail address is terminated
by
M W Leijendekker
6 hours, 29 minutes ago -
Enabling Secureboot
by
ITguy
13 hours, 29 minutes ago -
Windows hosting exposes additional bugs
by
Susan Bradley
1 day, 2 hours ago -
No more rounded corners??
by
CWBillow
22 hours, 2 minutes ago -
Android 15 and IPV6
by
Win7and10
11 hours, 47 minutes ago -
KB5058405 might fail to install with recovery error 0xc0000098 in ACPI.sys
by
Susan Bradley
1 day, 14 hours ago -
T-Mobile’s T-Life App has a “Screen Recording Tool” Turned on
by
Alex5723
1 day, 17 hours ago -
Windows 11 Insider Preview Build 26100.4202 (24H2) released to Release Preview
by
joep517
1 day, 11 hours ago -
Windows Update orchestration platform to update all software
by
Alex5723
2 days ago -
May preview updates
by
Susan Bradley
1 day, 11 hours ago -
Microsoft releases KB5061977 Windows 11 24H2, Server 2025 emergency out of band
by
Alex5723
1 day, 3 hours ago -
Just got this pop-up page while browsing
by
Alex5723
1 day, 16 hours ago -
KB5058379 / KB 5061768 Failures
by
crown
1 day, 13 hours ago -
Windows 10 23H2 Good to Update to ?
by
jkitc
16 hours, 2 minutes ago -
At last – installation of 24H2
by
Botswana12
2 days, 16 hours ago -
MS-DEFCON 4: As good as it gets
by
Susan Bradley
12 hours, 49 minutes ago -
RyTuneX optimize Windows 10/11 tool
by
Alex5723
3 days, 4 hours ago -
Can I just update from Win11 22H2 to 23H2?
by
Dave Easley
1 day, 2 hours ago -
Limited account permission error related to Windows Update
by
gtd12345
3 days, 17 hours ago -
Another test post
by
gtd12345
3 days, 17 hours ago -
Connect to someone else computer
by
wadeer
3 days, 12 hours ago
Recent blog posts
Key Links
Want to Advertise in the free newsletter? How about a gift subscription in honor of a birthday? Send an email to sb@askwoody.com to ask how.
Mastodon profile for DefConPatch
Mastodon profile for AskWoody
Home • About • FAQ • Posts & Privacy • Forums • My Account
Register • Free Newsletter • Plus Membership • Gift Certificates • MS-DEFCON Alerts
Copyright ©2004-2025 by AskWoody Tech LLC. All Rights Reserved.