CVE-2019-0703:An information disclosure vulnerability exists in the Windows SMB Server that could allow an attacker to disclose sensitive information by sending crafted SMB requests to affected systems.

splash
Back

Description Preview

CVE-2019-0703 describes an information disclosure vulnerability in the Windows SMB Server’s handling of certain requests. If exploited remotely over a network, an attacker could access sensitive information from memory or data processed by the SMB service, depending on the server’s configuration. The CVSS v3.1 base score is 6.5 (Network attack vector, low privileges required, no user interaction, high confidentiality impact; no impact to integrity or availability). Affected products include a range of Windows client and Windows Server versions listed in the advisory, spanning editions from Windows 7 SP1 through Windows 10 versions up to 1809 and corresponding Windows Server releases.

Overview

CVE-2019-0703, known as the Windows SMB Information Disclosure Vulnerability, is an information disclosure flaw in the Windows SMB Server that can be triggered over the network by certain SMB requests. If exploited, it could leak sensitive information from affected Windows clients and servers. The vulnerability has a CVSS v3.1 base score of 6.5, with a network attack vector, low privileges required, no user interaction, high confidentiality impact, and no impact on integrity or availability.

Remediation

  • Apply Microsoft-supplied security updates for CVE-2019-0703 to all affected Windows and Windows Server editions via Windows Update, WSUS, or your standard deployment tooling.
  • If immediate patching isn’t possible, mitigate exposure by restricting SMB exposure:
    • Block inbound SMB traffic (TCP ports 445 and 139) from untrusted networks and limit SMB access to trusted segments.
  • Disable SMBv1 on all systems where it is not required, and ensure SMBv2/SMB3 are enabled and properly configured.
  • If the SMB Server role is not needed, disable the Windows SMB Server/File and Printer Sharing features to reduce attack surface.
  • Enforce network segmentation and strong firewall rules around SMB traffic; enable SMB signing and, where supported, encryption.
  • Verify patch deployment with asset and vulnerability management tools and conduct post-patch validation.
  • Monitor logs and security alerts for signs of exploitation and consult relevant advisories (e.g., CISA KEV) for indicators of compromise.

References

  • Microsoft MSRC advisory CVE-2019-0703: https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0703
  • CISA Known Exploited Vulnerabilities Catalog – CVE-2019-0703: https://www.cisa.gov/known-exploited-vulnerabilities-catalog?search_api_fulltext=CVE-2019-0703
  • MITRE CVE entry for CVE-2019-0703: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0703

Early Warning

Customers using Armis Early Warning were notified about this vulnerability before it appeared in CISA's Known Exploited Vulnerabilities Catalog, enabling them to assess their exposure and act proactively. Armis offers these examples of CVEs already included in CISA KEV for potential customers. Click here to learn how to receive alerts earlier.

Armis Alert Date
Mar 13, 2019
CISA KEV Date
May 23, 2022
1167days early

Industry ExposureMost to least
This section illustrates the prevalence of a specific Common Vulnerabilities and Exposures (CVE) across various industries based on customer reports. The ranking displays industries from the most to least affected by this particular vulnerability, offering valuable insight into where this CVE has been most frequently observed. This information can help organizations within these sectors prioritize their security efforts, understand their relative risk exposure compared to their peers, and focus remediation strategies where they are most needed. By understanding the industry-specific impact, organizations can make more informed decisions regarding patching, resource allocation, and overall risk management related to this CVE.

  1. Manufacturing: Medium
    Manufacturing
  2. Health Care & Social Assistance: Medium
    Health Care & Social Assistance
  3. Public Administration: Medium
    Public Administration
  4. Transportation & Warehousing: Medium
    Transportation & Warehousing
  5. Educational Services: Medium
    Educational Services
  6. Finance and Insurance: Medium
    Finance and Insurance
  7. Retail Trade: Medium
    Retail Trade
  8. Professional, Scientific, & Technical Services: Low
    Professional, Scientific, & Technical Services
  9. Arts, Entertainment & Recreation: Low
    Arts, Entertainment & Recreation
  10. Other Services (except Public Administration): Low
    Other Services (except Public Administration)
  11. Utilities: Low
    Utilities
  12. Information: Low
    Information
  13. Management of Companies & Enterprises: Low
    Management of Companies & Enterprises
  14. Accommodation & Food Services: Low
    Accommodation & Food Services
  15. Mining: Low
    Mining
  16. Agriculture, Forestry Fishing & Hunting: Low
    Agriculture, Forestry Fishing & Hunting
  17. Real Estate Rental & Leasing: Low
    Real Estate Rental & Leasing
  18. Administrative, Support, Waste Management & Remediation Services: Low
    Administrative, Support, Waste Management & Remediation Services
  19. Construction: Low
    Construction
  20. Wholesale Trade: Low
    Wholesale Trade

Focus on What Matters

  1. See Everything.
  2. Identify True Risk.
  3. Proactively Mitigate Threats.

Let's talk!

background