INITIALIZING
📧 info@ciso.sa | 📱 +966550939344 | Riyadh, Kingdom of Saudi Arabia
🔧 Scheduled Maintenance — Saturday 2:00-4:00 AM AST. Some features may be temporarily unavailable.    ●   
💎
Pro Plan 50% Off Unlock all AI features, unlimited reports, and priority support. Upgrade
Search Center
ESC to close
Global vulnerability Industrial Control Systems / IoT / Infrastructure CRITICAL 1h Global phishing Multiple sectors HIGH 2h Global insider Cybersecurity Services CRITICAL 2h Global ransomware Multiple sectors (U.S. companies) CRITICAL 2h Global malware Financial Services, Cryptocurrency CRITICAL 3h Global malware Technology and Cloud Services HIGH 3h Global general Financial Services and E-commerce MEDIUM 3h Global data_breach Social Media and Communications CRITICAL 3h Global general Cybersecurity Operations HIGH 4h Global phishing Technology and Consumer Services HIGH 4h Global vulnerability Industrial Control Systems / IoT / Infrastructure CRITICAL 1h Global phishing Multiple sectors HIGH 2h Global insider Cybersecurity Services CRITICAL 2h Global ransomware Multiple sectors (U.S. companies) CRITICAL 2h Global malware Financial Services, Cryptocurrency CRITICAL 3h Global malware Technology and Cloud Services HIGH 3h Global general Financial Services and E-commerce MEDIUM 3h Global data_breach Social Media and Communications CRITICAL 3h Global general Cybersecurity Operations HIGH 4h Global phishing Technology and Consumer Services HIGH 4h Global vulnerability Industrial Control Systems / IoT / Infrastructure CRITICAL 1h Global phishing Multiple sectors HIGH 2h Global insider Cybersecurity Services CRITICAL 2h Global ransomware Multiple sectors (U.S. companies) CRITICAL 2h Global malware Financial Services, Cryptocurrency CRITICAL 3h Global malware Technology and Cloud Services HIGH 3h Global general Financial Services and E-commerce MEDIUM 3h Global data_breach Social Media and Communications CRITICAL 3h Global general Cybersecurity Operations HIGH 4h Global phishing Technology and Consumer Services HIGH 4h
Vulnerabilities

CVE-2020-0618

Critical 🇺🇸 CISA KEV ⚡ Exploit Available
Microsoft SQL Server Reporting Services Remote Code Execution Vulnerability — Microsoft SQL Server Reporting Services contains a deserialization vulnerability when handling page requests incorrectly.
Published: Sep 18, 2024  ·  Source: CISA_KEV
CVSS v3
9.0
🔗 NVD Official
📄 Description (English)

Microsoft SQL Server Reporting Services Remote Code Execution Vulnerability — Microsoft SQL Server Reporting Services contains a deserialization vulnerability when handling page requests incorrectly. An authenticated attacker can exploit this vulnerability to execute code in the context of the Report Server service account.

🤖 AI Executive Summary

CVE-2020-0618 is a critical remote code execution vulnerability in Microsoft SQL Server Reporting Services (SSRS) with a CVSS score of 9.0. An authenticated attacker can exploit a deserialization flaw in SSRS page request handling to execute arbitrary code under the Report Server service account context. A public exploit is available, significantly lowering the barrier for threat actors. Organizations running SSRS in enterprise environments must treat this as an urgent patching priority given the potential for lateral movement and data exfiltration.

📄 Description (Arabic)

🤖 AI Intelligence Analysis Analyzed: Apr 17, 2026 08:01
🇸🇦 Saudi Arabia Impact Assessment
Saudi organizations across multiple critical sectors face significant exposure. Banking and financial institutions regulated by SAMA that use SSRS for financial reporting and dashboards are at high risk of data breaches and regulatory non-compliance. Government entities under NCA oversight using SSRS for operational reporting could face unauthorized access to sensitive citizen and operational data. Energy sector organizations including Saudi Aramco and SABIC that rely on SSRS for operational analytics face potential disruption to critical infrastructure reporting. Healthcare organizations using SSRS for patient data reporting risk exposure of sensitive health records. Telecom providers such as STC using SSRS for network analytics dashboards are also at risk. Given that SSRS is widely deployed in enterprise Microsoft environments prevalent across Saudi Arabia, and that a public exploit exists, the risk of targeted attacks by regional threat actors is elevated.
🏢 Affected Saudi Sectors
Banking Government Energy Healthcare Telecom Financial Services Defense Education
⚖️ Saudi Risk Score (AI)
9.1
/ 10.0
🔧 Remediation Steps (English)
IMMEDIATE ACTIONS:
1. Identify all SSRS instances across the environment using asset inventory tools or network scanning.
2. Isolate internet-facing SSRS instances immediately behind VPN or restrict access to trusted IP ranges only.
3. Audit SSRS service account privileges and apply least-privilege principles — ensure the service account does not have domain admin or excessive database rights.

PATCHING GUIDANCE:
4. Apply Microsoft Security Update KB4532097 (SQL Server 2012 SP4 GDR), KB4532098 (SQL Server 2014 SP2 CU18), KB4532095 (SQL Server 2014 SP3 CU4), KB4532096 (SQL Server 2016 SP2 CU11), KB4532097 (SQL Server 2017 CU19) as applicable to your version.
5. Verify patch installation via Windows Update or WSUS and confirm SSRS version post-patching.

COMPENSATING CONTROLS (if patching is delayed):
6. Restrict SSRS access to authenticated internal users only via network ACLs and firewall rules.
7. Enable enhanced logging on SSRS and forward logs to SIEM for anomaly detection.
8. Disable SSRS service temporarily if not business-critical.
9. Deploy a Web Application Firewall (WAF) in front of SSRS to detect and block deserialization attack patterns.

DETECTION RULES:
10. Monitor for unusual child processes spawned by ReportingServicesService.exe (e.g., cmd.exe, powershell.exe, wscript.exe).
11. Alert on SSRS service account performing network connections to external IPs or accessing sensitive directories.
12. Search SSRS logs for malformed or oversized page requests that may indicate exploitation attempts.
13. Deploy Sigma/YARA rules targeting deserialization payloads in HTTP POST requests to SSRS endpoints (/ReportServer).
🔧 خطوات المعالجة (العربية)
الإجراءات الفورية:
1. تحديد جميع نسخ SSRS في البيئة باستخدام أدوات جرد الأصول أو فحص الشبكة.
2. عزل نسخ SSRS المكشوفة على الإنترنت فورًا خلف VPN أو تقييد الوصول إلى نطاقات IP موثوقة فقط.
3. مراجعة صلاحيات حساب خدمة SSRS وتطبيق مبدأ الحد الأدنى من الصلاحيات — التأكد من أن حساب الخدمة لا يمتلك صلاحيات مسؤول النطاق أو حقوق قاعدة البيانات المفرطة.

إرشادات التصحيح:
4. تطبيق تحديثات الأمان من Microsoft وفقًا لإصدار SQL Server المستخدم (KB4532097 أو KB4532098 أو KB4532095 أو KB4532096 حسب الإصدار).
5. التحقق من تثبيت التصحيح عبر Windows Update أو WSUS وتأكيد إصدار SSRS بعد التصحيح.

ضوابط التعويض (في حال تأخر التصحيح):
6. تقييد الوصول إلى SSRS للمستخدمين الداخليين المصادق عليهم فقط عبر قوائم التحكم بالوصول وقواعد جدار الحماية.
7. تفعيل التسجيل المحسّن على SSRS وإرسال السجلات إلى SIEM للكشف عن الشذوذات.
8. تعطيل خدمة SSRS مؤقتًا إذا لم تكن حيوية للأعمال.
9. نشر جدار حماية تطبيقات الويب (WAF) أمام SSRS للكشف عن أنماط هجمات إلغاء التسلسل وحجبها.

قواعد الكشف:
10. مراقبة العمليات الفرعية غير المعتادة التي تنشئها ReportingServicesService.exe مثل cmd.exe أو powershell.exe.
11. التنبيه عند قيام حساب خدمة SSRS بإجراء اتصالات شبكية بعناوين IP خارجية أو الوصول إلى مجلدات حساسة.
12. البحث في سجلات SSRS عن طلبات صفحات مشوهة أو كبيرة الحجم قد تشير إلى محاولات استغلال.
13. نشر قواعد Sigma/YARA التي تستهدف حمولات إلغاء التسلسل في طلبات HTTP POST إلى نقاط نهاية SSRS.
📋 Regulatory Compliance Mapping
🟢 NCA ECC 2024
ECC-1-4-2: Cybersecurity Vulnerability Management ECC-1-3-2: Cybersecurity Patch Management ECC-2-2-1: Access Control and Identity Management ECC-1-5-1: Cybersecurity Event Logging and Monitoring ECC-2-3-1: Network Security Controls
🔵 SAMA CSF
3.3.3 Vulnerability Management 3.3.5 Patch Management 3.2.2 Access Control Management 3.3.6 Security Monitoring and Logging 3.3.2 Threat Management
🟡 ISO 27001:2022
A.12.6.1 Management of Technical Vulnerabilities A.9.4.1 Information Access Restriction A.12.4.1 Event Logging A.14.2.2 System Change Control Procedures A.16.1.1 Responsibilities and Procedures for Incident Management
🟣 PCI DSS v4.0
Requirement 6.3.3: All system components are protected from known vulnerabilities by installing applicable security patches Requirement 7.2: Access control systems are configured to enforce least privilege Requirement 10.2: Audit logs capture all access to system components
🔗 References & Sources 0
No references.
📦 Affected Products / CPE 1 entries
Microsoft:SQL Server
📊 CVSS Score
9.0
/ 10.0 — Critical
📋 Quick Facts
Severity Critical
CVSS Score9.0
EPSS94.25%
Exploit ✓ Yes
Patch ✓ Yes
CISA KEV🇺🇸 Yes
KEV Due Date2024-10-09
Published 2024-09-18
Source Feed cisa_kev
Views 1
🇸🇦 Saudi Risk Score
9.1
/ 10.0 — Saudi Risk
🏷️ Tags
kev actively-exploited
Share this CVE
📣 Found this valuable?
Share it with your cybersecurity network
in LinkedIn 𝕏 X / Twitter 💬 WhatsApp ✈ Telegram
🍪 Privacy Preferences
CISO Consulting — Compliant with Saudi Personal Data Protection Law (PDPL)
We use cookies and similar technologies to provide the best experience on our platform. You can choose which types you accept.
🔒
Essential Always On
Required for the website to function properly. Cannot be disabled.
📋 Sessions, CSRF tokens, authentication, language preferences
📊
Analytics
Help us understand how visitors use the site and improve performance.
📋 Page views, session duration, traffic sources, performance metrics
⚙️
Functional
Enable enhanced features like content personalization and preferences.
📋 Dark/light theme, font size, custom dashboards, saved filters
📣
Marketing
Used to deliver content and ads relevant to your interests.
📋 Campaign tracking, retargeting, social media analytics
Privacy Policy →
CISO AI Assistant
Ask anything · Documents · Support
🔐

Introduce Yourself

Enter your details to access the full assistant

Your info is private and never shared
💬
CyberAssist
Online · responds in seconds
5 / 5
🔐 Verify Your Identity

Enter your email to receive a verification code before submitting a support request.

Enter to send · / for commands 0 / 2000
CISO AI · Powered by Anthropic Claude
✦ Quick Survey Help Us Improve CISO Consulting Your feedback shapes the future of our platform — takes less than 2 minutes.
⚠ Please answer this question to continue

How would you rate your overall experience with our platform?

Rate from 1 (poor) to 5 (excellent)

🎉
Thank you!
Your response has been recorded.