INITIALIZING
📧 info@ciso.sa | 📱 +966550939344 | Riyadh, Kingdom of Saudi Arabia
🔧 Scheduled Maintenance — Saturday 2:00-4:00 AM AST. Some features may be temporarily unavailable.    ●   
💎
Pro Plan 50% Off Unlock all AI features, unlimited reports, and priority support. Upgrade
Search Center
ESC to close
Global data_breach Government CRITICAL 4h Global ransomware Financial Services / Cybersecurity CRITICAL 4h Global vulnerability Information Technology / Cybersecurity CRITICAL 6h Global malware Energy and Utilities CRITICAL 7h Global ransomware Multiple sectors CRITICAL 7h Global vulnerability Industrial Control Systems / IoT / Infrastructure CRITICAL 10h Global supply_chain Information Technology and Critical Infrastructure CRITICAL 10h Global phishing Multiple sectors HIGH 11h Global insider Cybersecurity Services CRITICAL 11h Global ransomware Multiple sectors (U.S. companies) CRITICAL 11h Global data_breach Government CRITICAL 4h Global ransomware Financial Services / Cybersecurity CRITICAL 4h Global vulnerability Information Technology / Cybersecurity CRITICAL 6h Global malware Energy and Utilities CRITICAL 7h Global ransomware Multiple sectors CRITICAL 7h Global vulnerability Industrial Control Systems / IoT / Infrastructure CRITICAL 10h Global supply_chain Information Technology and Critical Infrastructure CRITICAL 10h Global phishing Multiple sectors HIGH 11h Global insider Cybersecurity Services CRITICAL 11h Global ransomware Multiple sectors (U.S. companies) CRITICAL 11h Global data_breach Government CRITICAL 4h Global ransomware Financial Services / Cybersecurity CRITICAL 4h Global vulnerability Information Technology / Cybersecurity CRITICAL 6h Global malware Energy and Utilities CRITICAL 7h Global ransomware Multiple sectors CRITICAL 7h Global vulnerability Industrial Control Systems / IoT / Infrastructure CRITICAL 10h Global supply_chain Information Technology and Critical Infrastructure CRITICAL 10h Global phishing Multiple sectors HIGH 11h Global insider Cybersecurity Services CRITICAL 11h Global ransomware Multiple sectors (U.S. companies) CRITICAL 11h
Vulnerabilities

CVE-2020-0796

Critical 🇺🇸 CISA KEV ⚡ Exploit Available
Microsoft SMBv3 Remote Code Execution Vulnerability — A remote code execution vulnerability exists in the way that the Microsoft Server Message Block 3.1.1 (SMBv3) protocol handles certain requests. A
Published: Feb 10, 2022  ·  Source: CISA_KEV
CVSS v3
9.0
🔗 NVD Official
📄 Description (English)

Microsoft SMBv3 Remote Code Execution Vulnerability — A remote code execution vulnerability exists in the way that the Microsoft Server Message Block 3.1.1 (SMBv3) protocol handles certain requests. An attacker who successfully exploited the vulnerability could gain the ability to execute code on the target server or client.

🤖 AI Executive Summary

CVE-2020-0796, known as 'SMBGhost', is a critical remote code execution vulnerability in Microsoft's SMBv3 protocol (version 3.1.1) affecting Windows 10 and Windows Server 2019. An unauthenticated attacker can exploit a buffer overflow in the compression handling of SMBv3 to execute arbitrary code with SYSTEM-level privileges on both servers and clients. Public exploits are widely available, making this a high-priority threat for any organization running unpatched Windows systems. The vulnerability is wormable, meaning it can propagate across networks without user interaction, similar to EternalBlue (MS17-010).

📄 Description (Arabic)

🤖 AI Intelligence Analysis Analyzed: Apr 17, 2026 14:48
🇸🇦 Saudi Arabia Impact Assessment
This vulnerability poses an extreme risk to Saudi organizations across all critical sectors. Banking and financial institutions regulated by SAMA are at high risk given widespread Windows Server 2019 deployments in core banking infrastructure. Government entities under NCA oversight running Windows 10 endpoints and servers face potential full network compromise. Saudi Aramco and energy sector OT/IT convergence environments are particularly vulnerable as SMB is commonly used for file sharing across operational networks. Telecom providers such as STC with large Windows-based infrastructure could face wormable propagation across their networks. Healthcare organizations using Windows-based medical systems and PACS servers are also critically exposed. The wormable nature of this vulnerability means a single unpatched system could lead to complete organizational compromise.
🏢 Affected Saudi Sectors
Banking Government Energy Healthcare Telecom Education Defense Transportation Retail
⚖️ Saudi Risk Score (AI)
9.8
/ 10.0
🔧 Remediation Steps (English)
IMMEDIATE ACTIONS (within 24 hours):
1. Apply Microsoft security update KB4551762 immediately for Windows 10 v1903/1909 and Windows Server 2019.
2. Identify all systems running SMBv3 using: Get-SmbServerConfiguration | Select EnableSMB2Protocol
3. Isolate any unpatched systems from the network immediately.

COMPENSATING CONTROLS (if patching is not immediately possible):
1. Disable SMBv3 compression on servers using PowerShell: Set-ItemProperty -Path 'HKLM:\SYSTEM\CurrentControlSet\Services\LanmanServer\Parameters' DisableCompression -Type DWORD -Value 1 -Force
2. Block TCP port 445 at the perimeter firewall and between network segments.
3. Block SMB traffic from reaching internet-facing systems.
4. Implement network segmentation to limit lateral movement.

DETECTION RULES:
1. Monitor for anomalous SMB traffic patterns, especially large compressed packets.
2. Deploy Snort/Suricata rule: alert tcp any any -> any 445 (msg:'SMBGhost CVE-2020-0796'; content:'|FC 53 4D 42|'; depth:8;)
3. Enable Windows Event ID 4625 and 4648 monitoring for unusual authentication attempts.
4. Monitor for SYSTEM-level process creation from SMB-related processes (srv2.sys).
5. Use Microsoft Defender ATP or equivalent EDR to detect exploitation attempts.

POST-PATCH VALIDATION:
1. Verify patch installation: wmic qfe list | findstr KB4551762
2. Conduct vulnerability scanning using tools like Nessus or Qualys to confirm remediation.
🔧 خطوات المعالجة (العربية)
الإجراءات الفورية (خلال 24 ساعة):
1. تطبيق تحديث مايكروسوفت الأمني KB4551762 فوراً لأنظمة Windows 10 الإصدار 1903/1909 وWindows Server 2019.
2. تحديد جميع الأنظمة التي تشغل SMBv3 باستخدام الأمر: Get-SmbServerConfiguration | Select EnableSMB2Protocol
3. عزل أي أنظمة غير مُرقَّعة عن الشبكة فوراً.

ضوابط التعويض (إذا تعذر التصحيح الفوري):
1. تعطيل ضغط SMBv3 على الخوادم باستخدام PowerShell.
2. حجب المنفذ TCP 445 على جدار الحماية الخارجي وبين قطاعات الشبكة.
3. منع حركة مرور SMB من الوصول إلى الأنظمة المواجهة للإنترنت.
4. تطبيق تجزئة الشبكة للحد من الحركة الجانبية.

قواعد الكشف:
1. مراقبة أنماط حركة مرور SMB غير الطبيعية، خاصة الحزم المضغوطة الكبيرة.
2. نشر قواعد Snort/Suricata للكشف عن محاولات الاستغلال.
3. تفعيل مراقبة معرفات أحداث Windows 4625 و4648.
4. مراقبة إنشاء العمليات بصلاحيات SYSTEM من العمليات المرتبطة بـ SMB.
5. استخدام Microsoft Defender ATP أو ما يعادله للكشف عن محاولات الاستغلال.

التحقق بعد التصحيح:
1. التحقق من تثبيت التحديث: wmic qfe list | findstr KB4551762
2. إجراء فحص للثغرات باستخدام أدوات مثل Nessus أو Qualys للتأكد من المعالجة.
📋 Regulatory Compliance Mapping
🟢 NCA ECC 2024
ECC-1-4-2: Cybersecurity Vulnerability Management ECC-1-3-2: Network Security Controls ECC-1-4-1: Patch Management ECC-2-2-1: Protection of Critical Systems ECC-1-3-6: Remote Access Security
🔵 SAMA CSF
3.3.5 - Vulnerability Management 3.3.6 - Patch Management 3.3.2 - Network Security 3.4.2 - Incident Management 3.3.1 - Infrastructure Security
🟡 ISO 27001:2022
A.12.6.1 - Management of Technical Vulnerabilities A.13.1.1 - Network Controls A.13.1.3 - Segregation in Networks A.16.1.5 - Response to Information Security Incidents A.12.2.1 - Controls Against Malware
🟣 PCI DSS v4.0
Requirement 6.3.3 - All system components are protected from known vulnerabilities Requirement 1.3.2 - Restrict inbound and outbound traffic to only that necessary Requirement 11.3.1 - Internal vulnerability scanning Requirement 6.4.1 - Security patches/updates are installed within defined timeframes
🔗 References & Sources 0
No references.
📦 Affected Products / CPE 1 entries
Microsoft:SMBv3
📊 CVSS Score
9.0
/ 10.0 — Critical
📋 Quick Facts
Severity Critical
CVSS Score9.0
EPSS94.41%
Exploit ✓ Yes
Patch ✓ Yes
CISA KEV🇺🇸 Yes
KEV Due Date2022-08-10
Published 2022-02-10
Source Feed cisa_kev
Views 4
🇸🇦 Saudi Risk Score
9.8
/ 10.0 — Saudi Risk
🏷️ Tags
kev actively-exploited ransomware
Share this CVE
📣 Found this valuable?
Share it with your cybersecurity network
in LinkedIn 𝕏 X / Twitter 💬 WhatsApp ✈ Telegram
🍪 Privacy Preferences
CISO Consulting — Compliant with Saudi Personal Data Protection Law (PDPL)
We use cookies and similar technologies to provide the best experience on our platform. You can choose which types you accept.
🔒
Essential Always On
Required for the website to function properly. Cannot be disabled.
📋 Sessions, CSRF tokens, authentication, language preferences
📊
Analytics
Help us understand how visitors use the site and improve performance.
📋 Page views, session duration, traffic sources, performance metrics
⚙️
Functional
Enable enhanced features like content personalization and preferences.
📋 Dark/light theme, font size, custom dashboards, saved filters
📣
Marketing
Used to deliver content and ads relevant to your interests.
📋 Campaign tracking, retargeting, social media analytics
Privacy Policy →
CISO AI Assistant
Ask anything · Documents · Support
🔐

Introduce Yourself

Enter your details to access the full assistant

Your info is private and never shared
💬
CyberAssist
Online · responds in seconds
5 / 5
🔐 Verify Your Identity

Enter your email to receive a verification code before submitting a support request.

Enter to send · / for commands 0 / 2000
CISO AI · Powered by Anthropic Claude
✦ Quick Survey Help Us Improve CISO Consulting Your feedback shapes the future of our platform — takes less than 2 minutes.
⚠ Please answer this question to continue

How would you rate your overall experience with our platform?

Rate from 1 (poor) to 5 (excellent)

🎉
Thank you!
Your response has been recorded.