近期发现Microsoft Windows SMBv3存在远程代码执行漏洞( CNVD-2020-16676),攻击者可利用该漏洞远程执行代码。漏洞影响范围为:Windows 10 Version 1903 for 32-bit Sys tems、Windows 10 Version 1903 for x64-based Sys tems、Windows 10 Version 1903 for ARM64-based Sys temsWindows Server, Version 1903 (Server Core instal1ation)、Windows 10 Version 1909 for 32-bit Sys tems、Windows 10 Version 1909 for x64-based Sys tems、Windows 10 Version 1909 for ARM64-based Sys tems、Windows Server, Version 1909 (Server Core installation)
目前,微软官方已发布针对此漏洞受影响版本的补丁程序,该安全更新通过更正SMBv3协议处理这些特制请求的方式来解决此漏洞。建议用户参考以下链接尽快安装补丁程序:
https://Portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0796
(详情请看附件3)