Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2020-0796

KEV · Ransomware EPSS 94.41% · P100
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2020-0796

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
A remote code execution vulnerability exists in the way that the Microsoft Server Message Block 3.1.1 (SMBv3) protocol handles certain requests, aka 'Windows SMBv3 Client/Server Remote Code Execution Vulnerability'.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
微软 Microsoft SMBv3 缓冲区错误漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Microsoft SMBv3是美国微软(Microsoft)公司的一个为设备提供SMB功能的支持固件。 Microsoft Server Message Block 3.1.1 (SMBv3)版本中存在缓冲区错误漏洞,该漏洞源于SMBv3协议在处理恶意压缩数据包时,进入了错误流程。远程未经身份验证的攻击者可利用该漏洞在应用程序中执行任意代码。以下产品及版本受到影响:Microsoft Windows 10版本1903,Windows Server版本1903,Windows 10版本1909,Windo
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Shenlong Deep Dive — AI Deep Analysis

10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.

Affected Products

II. Public POCs for CVE-2020-0796

#POC DescriptionSource LinkShenlong Link
1Ladon Scanner For Python, Large Network Penetration Scanner & Cobalt Strike, vulnerability / exploit / detection / MS17010/SmbGhost/CVE-2020-0796/CVE-2018-2894https://github.com/k8gege/PyLadonPOC Details
2Weaponized PoC for SMBv3 TCP codec/compression vulnerabilityhttps://github.com/Aekras1a/CVE-2020-0796-PoCPOC Details
3CVE-2020-0796 Flaw Mitigation - Active Directory Administrative Templateshttps://github.com/technion/DisableSMBCompressionPOC Details
4Powershell SMBv3 Compression checkerhttps://github.com/T13nn3s/CVE-2020-0796POC Details
5Scanner for CVE-2020-0796 - SMBv3 RCEhttps://github.com/ly4k/SMBGhostPOC Details
6Script that checks if the system is vulnerable to CVE-2020-0796 (SMB v3.1.1)https://github.com/joaozietolie/CVE-2020-0796-CheckerPOC Details
7Identifying and Mitigating the CVE-2020–0796 flaw in the flyhttps://github.com/ButrintKomoni/cve-2020-0796POC Details
8This project is used for scanning cve-2020-0796 SMB vulnerabilityhttps://github.com/dickens88/cve-2020-0796-scannerPOC Details
9Nonehttps://github.com/kn6869610/CVE-2020-0796POC Details
10This repository contains a test case for CVE-2020-0796https://github.com/awareseven/eternalghosttestPOC Details
11CVE-2020-0796 SMBv3.1.1 Compression Capability Vulnerability Scannerhttps://github.com/xax007/CVE-2020-0796-ScannerPOC Details
12Scanners List - Microsoft Windows SMBv3 Remote Code Execution Vulnerability (CVE-2020-0796) https://github.com/Dhoomralochana/Scanners-for-CVE-2020-0796-TestingPOC Details
13Check system is vulnerable CVE-2020-0796 (SMB v3)https://github.com/UraSecTeam/smbeePOC Details
14SMBGhost (CVE-2020-0796) threaded scannerhttps://github.com/netscylla/SMBGhostPOC Details
15PoC for triggering buffer overflow via CVE-2020-0796https://github.com/eerykitty/CVE-2020-0796-PoCPOC Details
16Scanner script to identify hosts vulnerable to CVE-2020-0796https://github.com/wneessen/SMBCompScanPOC Details
17Scanner for CVE-2020-0796 - A SMBv3.1.1 + SMB compression RCE https://github.com/ioncodes/SMBGhostPOC Details
18SMBv3 RCE vulnerability in SMBv3https://github.com/laolisafe/CVE-2020-0796POC Details
19Multithread SMB scanner to check CVE-2020-0796 for SMB v3.11https://github.com/gabimarti/SMBScannerPOC Details
20This script will apply the workaround for the vulnerability CVE-2020-0796 for the SMBv3 unauthenticated RCEhttps://github.com/Almorabea/SMBGhost-WorkaroundApplierPOC Details
21CVE-2020-0796 - Working PoC - 20200313https://github.com/vysecurity/CVE-2020-0796POC Details
22CVE-2020-0796 SMBGhosthttps://github.com/marcinguy/CVE-2020-0796POC Details
23Little scanner to know if a machine is runnig SMBv3 (possible vulnerability CVE-2020-0796)https://github.com/BinaryShadow94/SMBv3.1.1-scan---CVE-2020-0796POC Details
24Advanced scanner for CVE-2020-0796 - SMBv3 RCE https://github.com/w1ld3r/SMBGhost_ScannerPOC Details
25CVE-2020-0796 Python POC buffer overflowhttps://github.com/wsfengfan/CVE-2020-0796POC Details
26基于asyncio(协程)的CVE-2020-0796 速度还是十分可观的,方便运维师傅们对内网做下快速检测。https://github.com/GuoKerS/aioScan_CVE-2020-0796POC Details
27CVE-2020-0796-Scannerhttps://github.com/jiansiting/CVE-2020-0796-ScannerPOC Details
28An unauthenticated PoC for CVE-2020-0796https://github.com/maxpl0it/Unauthenticated-CVE-2020-0796-PoCPOC Details
29Lightweight PoC and Scanner for CVE-2020-0796 without authentication.https://github.com/ran-sama/CVE-2020-0796POC Details
30CVE-2020-0796_CoronaBlue_SMBGhosthttps://github.com/sujitawake/smbghostPOC Details
31Scanner for CVE-2020-0796https://github.com/julixsalas/CVE-2020-0796POC Details
32CVE-2020-0796.SMBGhost_Crash_Poc https://github.com/5l1v3r1/SMBGhost_Crash_PocPOC Details
33Lightweight PoC and Scanner for CVE-2020-0796 without authentication.https://github.com/5l1v3r1/CVE-2020-0796-PoC-and-ScanPOC Details
34DoS PoC for CVE-2020-0796 (SMBGhost)https://github.com/cory-zajicek/CVE-2020-0796-DoSPOC Details
35Nonehttps://github.com/tripledd/cve-2020-0796-vulnPOC Details
36CVE-2020-0796 - Windows SMBv3 LPE exploit #SMBGhosthttps://github.com/danigargu/CVE-2020-0796POC Details
37CVE-2020-0796 Local Privilege Escalation POChttps://github.com/jamf/CVE-2020-0796-LPE-POCPOC Details
38SMBGHOST local privilege escalationhttps://github.com/TinToSer/CVE-2020-0796-LPEPOC Details
39Windows SMBv3 LPE exploit 已编译版https://github.com/f1tz/CVE-2020-0796-LPE-EXPPOC Details
40Coronablue exploithttps://github.com/tango-j/CVE-2020-0796POC Details
41Nonehttps://github.com/jiansiting/CVE-2020-0796POC Details
42该资源为CVE-2020-0796漏洞复现,包括Python版本和C++版本。主要是集合了github大神们的资源,希望您喜欢~https://github.com/eastmountyxz/CVE-2020-0796-SMBPOC Details
43CVE-2020-0796-EXPhttps://github.com/LabDookhtegan/CVE-2020-0796-EXPPOC Details
44Cobalt Strike AggressorScripts CVE-2020-0796https://github.com/Rvn0xsy/CVE_2020_0796_CNAPOC Details
45CVE-2020-0796 (SMBGhost) LPEhttps://github.com/0xeb-bp/cve-2020-0796POC Details
46This tool helps scan large subnets for cve-2020-0796 vulnerable systemshttps://github.com/intelliroot-tech/cve-2020-0796-ScannerPOC Details
47CVE-2020-0796 Remote Code Execution POChttps://github.com/jamf/CVE-2020-0796-RCE-POCPOC Details
48PoC RCE Reverse Shell for CVE-2020-0796 (SMBGhost)https://github.com/thelostworldFree/CVE-2020-0796POC Details
49Nonehttps://github.com/section-c/CVE-2020-0796POC Details
50SMBGhost CVE-2020-0796https://github.com/bacth0san96/SMBGhostScannerPOC Details
51Nonehttps://github.com/halsten/CVE-2020-0796POC Details
52CVE-2020-0796https://github.com/ysyyrps123/CVE-2020-0796POC Details
53CVE-2020-0796-exphttps://github.com/ysyyrps123/CVE-2020-0796-expPOC Details
54SMBv3 Ghost (CVE-2020-0796) Vulnerabilityhttps://github.com/exp-sky/CVE-2020-0796POC Details
55SMBGhost (CVE-2020-0796) Automate Exploitation and Detectionhttps://github.com/Barriuso/SMBGhost_AutomateExploitationPOC Details
56批量测试CVE-2020-0796 - SMBv3 RCEhttps://github.com/1060275195/SMBGhostPOC Details
57This is an implementation of the CVE-2020-0796 aka SMBGhost vulnerability, compatible with the Metasploit Frameworkhttps://github.com/Almorabea/SMBGhost-LPE-Metasploit-ModulePOC Details
58SMBGhost (CVE-2020-0796) and SMBleed (CVE-2020-1206) Scannerhttps://github.com/jamf/SMBGhost-SMBleed-scannerPOC Details
59CVE-2020-0796. Smbghost Local Privilege Escalationhttps://github.com/5l1v3r1/smbghost-5POC Details
60Nonehttps://github.com/rsmudge/CVE-2020-0796-BOFPOC Details
61To crash Windows-10 easilyhttps://github.com/codewithpradhan/SMBGhost-CVE-2020-0796-POC Details
62CVE-2020-0796-POChttps://github.com/AaronCaiii/CVE-2020-0796-POCPOC Details
63Nonehttps://github.com/datntsec/CVE-2020-0796POC Details
64Nonehttps://github.com/MasterSploit/LPE---CVE-2020-0796POC Details
65Nonehttps://github.com/1stPeak/CVE-2020-0796-ScannerPOC Details
66Nonehttps://github.com/Anonimo501/SMBGhost_CVE-2020-0796_checkerPOC Details
67Nonehttps://github.com/Opensitoo/cve-2020-0796POC Details
68Remote Code Execution POC for CVE-2020-0796https://github.com/orangmuda/CVE-2020-0796POC Details
69Nonehttps://github.com/Murasame-nc/CVE-2020-0796-LPE-POCPOC Details
70批量扫描CVE-2020-0796https://github.com/F6JO/CVE-2020-0796-Batch-scanningPOC Details
71Nonehttps://github.com/lisinan988/CVE-2020-0796-expPOC Details
72 CVE-2020-0796 - a wormable SMBv3 vulnerability. https://github.com/5l1v3r1/CVE-2020-0796-PoC-3POC Details
73Multithreaded Scanner for CVE-2020-0796 - SMBv3 RCEhttps://github.com/5l1v3r1/SMBGhostsPOC Details
74Description of Exploit SMBGhost CVE-2020-0796 https://github.com/vsai94/ECE9069_SMBGhost_Exploit_CVE-2020-0796-POC Details
75CVE-2020-0796 explanation and researching vulnerability for term porject CENG325https://github.com/arzuozkan/CVE-2020-0796POC Details
76CVE-2020-0796https://github.com/SEHandler/CVE-2020-0796POC Details
77CVE-2020-0796-利用工具https://github.com/TweatherQ/CVE-2020-0796POC Details
78windows 10 SMB vulnerabilityhttps://github.com/krizzz07/CVE-2020-0796POC Details
79cve-2020-0796利用工具集https://github.com/OldDream666/cve-2020-0796POC Details
80CVE-2020-0796 SMB Ghost vulnerability detection and mitigationhttps://github.com/heeloo123/CVE-2020-0796POC Details
81WindowsProtocolTestSuites is to trigger BSoD, and full exploit poc.https://github.com/Ajomix/CVE-2020-0796POC Details
82Nonehttps://github.com/Vladshambaryan/https-github.com-jamf-CVE-2020-0796-RCE-POCPOC Details
83Nonehttps://github.com/hungdnvp/POC-CVE-2020-0796POC Details
84This script will help you to scan for smbGhost vulnerability(CVE-2020-0796)https://github.com/AdamSonov/smbGhostCVE-2020-0796POC Details
85Weaponized PoC for SMBv3 TCP codec/compression vulnerabilityhttps://github.com/0x25bit/CVE-2020-0796-PoCPOC Details
86This repository contains detailed documentation and code related to the exploitation, detection, and mitigation of two significant vulnerabilities: CVE-2020-0796 (SMBGhost) and Print Spooler.https://github.com/z3ena/Exploiting-and-Mitigating-CVE-2020-0796-SMBGhost-and-Print-Spooler-VulnerabilitiesPOC Details
87WindowsProtocolTestSuites is to trigger BSoD, and full exploit poc.https://github.com/dungnm24/CVE-2020-0796POC Details
88Nonehttps://github.com/Kaizzzo1/CVE-2020-0796POC Details
89Nonehttps://github.com/monjheta/CVE-2020-0796POC Details
90Nonehttps://github.com/Threekiii/Awesome-POC/blob/master/%E6%93%8D%E4%BD%9C%E7%B3%BB%E7%BB%9F%E6%BC%8F%E6%B4%9E/Windows%20SMB%20%E8%BF%9C%E7%A8%8B%E4%BB%A3%E7%A0%81%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E%20CVE-2020-0796.mdPOC Details
91A remote code execution vulnerability exists in the way that the Microsoft Server Message Block 3.1.1 (SMBv3) protocol handles certain requests, aka 'Windows SMBv3 Client/Server Remote Code Execution Vulnerability'. https://github.com/projectdiscovery/nuclei-templates/blob/main/network/cves/2020/CVE-2020-0796.yamlPOC Details
92Nonehttps://github.com/madanokr001/CVE-2020-0796POC Details
93Nonehttps://github.com/tdevworks/CVE-2020-0796-SMBGhost-Exploit-DemoPOC Details
94Nonehttps://github.com/maqeel-git/CVE-2020-0796POC Details
95Nonehttps://github.com/cybermads/CVE-2020-0796POC Details
96Nonehttps://github.com/esmwaSpyware/DoS-PoC-for-CVE-2020-0796-SMBGhost-POC Details
97Nonehttps://github.com/bsec404/CVE-2020-0796POC Details
98CVE-2020-0796 (SMBGhost) is a critical RCE vulnerability in Windows 10 SMBv3 protocol. It allows attackers to execute code remotely via crafted SMB packets, making it wormable. Affects Windows 10 v1903/v1909 and Server 2019. Exploit targets srv2.sys via buffer overflowhttps://github.com/Jagadeesh7532/-CVE-2020-0796-SMBGhost-Windows-10-SMBv3-Remote-Code-Execution-VulnerabilityPOC Details
99Nonehttps://github.com/nyambiblaise/Microsoft-Windows-SMBGhost-Vulnerability-Checker---CVE-2020-0796---SMBv3-RCEPOC Details
100Nonehttps://github.com/thai1012/cve-2020-0796POC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2020-0796

登录查看更多情报信息。

Same Patch Batch · Microsoft · 2020-03-12 · 116 CVEs total

CVE-2020-0811Microsoft ChakraCore和Edge 缓冲区错误漏洞
CVE-2020-0791Microsoft Windows Graphics Component 缓冲区错误漏洞
CVE-2020-0795Microsoft Business Productivity Servers、SharePoint Enterprise Server和SharePoint Foundation
CVE-2020-0798Microsoft Windows Installer 安全漏洞
CVE-2020-0797Microsoft Windows Work Folder Service 安全漏洞
CVE-2020-0800Microsoft Windows Work Folder Service 安全漏洞
CVE-2020-0799Microsoft Windows Kernel 安全漏洞
CVE-2020-0802Microsoft Windows Network Connections Service 安全漏洞
CVE-2020-0801Microsoft Windows Media Foundation 缓冲区错误漏洞
CVE-2020-0804Microsoft Windows Network Connections Service 安全漏洞
CVE-2020-0803Microsoft Windows Network Connections Service 安全漏洞
CVE-2020-0807Microsoft Windows Media Foundation 缓冲区错误漏洞
CVE-2020-0806Microsoft Windows Error Reporting 安全漏洞
CVE-2020-0809Microsoft Windows Media Foundation 缓冲区错误漏洞
CVE-2020-0808Microsoft Windows Provisioning Runtime 安全漏洞
CVE-2020-0825Microsoft ChakraCore和Edge 缓冲区错误漏洞
CVE-2020-0816Microsoft Edge 缓冲区错误漏洞
CVE-2020-0823Microsoft Edge和ChakraCore 缓冲区错误漏洞
CVE-2020-0822Microsoft Windows 安全漏洞
CVE-2020-0819Microsoft Windows Device Setup Manager 安全漏洞

Showing top 20 of 116 CVEs. View all on vendor page → →

IV. Related Vulnerabilities

V. Comments for CVE-2020-0796

Anonymous User
2026-01-15 06:09:01

Zaproxy alias impedit expedita quisquam pariatur exercitationem. Nemo rerum eveniet dolores rem quia dignissimos.


Leave a comment