{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-23T11:35:02.744","vulnerabilities":[{"cve":{"id":"CVE-2020-0796","sourceIdentifier":"secure@microsoft.com","published":"2020-03-12T16:15:15.627","lastModified":"2025-10-29T14:27:11.213","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"A remote code execution vulnerability exists in the way that the Microsoft Server Message Block 3.1.1 (SMBv3) protocol handles certain requests, aka 'Windows SMBv3 Client/Server Remote Code Execution Vulnerability'."},{"lang":"es","value":"Existe una vulnerabilidad de ejecución de código remota en la manera en que el protocolo Microsoft Server Message Block (SMBv3) versión 3.1.1, maneja determinadas peticiones, también se conoce como ''Windows SMBv3 Client/Server Remote Code Execution Vulnerability\"."}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H","baseScore":10.0,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":6.0},{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H","baseScore":10.0,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":6.0}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"cisaExploitAdd":"2022-02-10","cisaActionDue":"2022-08-10","cisaRequiredAction":"Apply updates per vendor instructions.","cisaVulnerabilityName":"Microsoft SMBv3 Remote Code Execution Vulnerability","weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-119"}]},{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","description":[{"lang":"en","value":"CWE-119"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_10_1903:-:*:*:*:*:*:arm64:*","matchCriteriaId":"9E1ED169-6F03-4BD5-B227-5FA54DB40AD7"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_10_1903:-:*:*:*:*:*:x64:*","matchCriteriaId":"5C5B5180-1E12-45C2-8275-B9E528955307"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_10_1903:-:*:*:*:*:*:x86:*","matchCriteriaId":"B6A0DB01-49CB-4445-AFE8-57C2186857BA"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_10_1909:-:*:*:*:*:*:arm64:*","matchCriteriaId":"9285A9B5-4759-43E7-9589-CDBCA7100605"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_10_1909:-:*:*:*:*:*:x64:*","matchCriteriaId":"0D77EA14-F61D-4B9E-A385-70B88C482116"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_10_1909:-:*:*:*:*:*:x86:*","matchCriteriaId":"1A6FC9EE-D486-4AFE-A20E-4278468A1779"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_server_1903:-:*:*:*:*:*:x64:*","matchCriteriaId":"FFE3495D-291C-46B6-B758-23E16A53A7C3"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_server_1909:-:*:*:*:*:*:x64:*","matchCriteriaId":"11E7F8F0-4FA8-4AA6-92A5-860E77AC933D"}]}]}],"references":[{"url":"http://packetstormsecurity.com/files/156731/CoronaBlue-SMBGhost-Microsoft-Windows-10-SMB-3.1.1-Proof-Of-Concept.html","source":"secure@microsoft.com","tags":["Third Party Advisory","VDB Entry"]},{"url":"http://packetstormsecurity.com/files/156732/Microsoft-Windows-SMB-3.1.1-Remote-Code-Execution.html","source":"secure@microsoft.com","tags":["Exploit","Third Party Advisory","VDB Entry"]},{"url":"http://packetstormsecurity.com/files/156980/Microsoft-Windows-10-SMB-3.1.1-Local-Privilege-Escalation.html","source":"secure@microsoft.com","tags":["Third Party Advisory","VDB Entry"]},{"url":"http://packetstormsecurity.com/files/157110/SMBv3-Compression-Buffer-Overflow.html","source":"secure@microsoft.com","tags":["Exploit","Third Party Advisory","VDB Entry"]},{"url":"http://packetstormsecurity.com/files/157901/Microsoft-Windows-SMBGhost-Remote-Code-Execution.html","source":"secure@microsoft.com","tags":["Third Party Advisory","VDB Entry"]},{"url":"http://packetstormsecurity.com/files/158054/SMBleed-SMBGhost-Pre-Authentication-Remote-Code-Execution-Proof-Of-Concept.html","source":"secure@microsoft.com","tags":["Third Party Advisory","VDB Entry"]},{"url":"https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0796","source":"secure@microsoft.com","tags":["Patch","Vendor Advisory"]},{"url":"http://packetstormsecurity.com/files/156731/CoronaBlue-SMBGhost-Microsoft-Windows-10-SMB-3.1.1-Proof-Of-Concept.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory","VDB Entry"]},{"url":"http://packetstormsecurity.com/files/156732/Microsoft-Windows-SMB-3.1.1-Remote-Code-Execution.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Third Party Advisory","VDB Entry"]},{"url":"http://packetstormsecurity.com/files/156980/Microsoft-Windows-10-SMB-3.1.1-Local-Privilege-Escalation.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory","VDB Entry"]},{"url":"http://packetstormsecurity.com/files/157110/SMBv3-Compression-Buffer-Overflow.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Third Party Advisory","VDB Entry"]},{"url":"http://packetstormsecurity.com/files/157901/Microsoft-Windows-SMBGhost-Remote-Code-Execution.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory","VDB Entry"]},{"url":"http://packetstormsecurity.com/files/158054/SMBleed-SMBGhost-Pre-Authentication-Remote-Code-Execution-Proof-Of-Concept.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory","VDB Entry"]},{"url":"https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0796","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2020-0796","source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","tags":["US Government Resource"]}]}}]}