Breaking

Microsoft releases fix for the critical SMBv3 vulnerability- Patch now

Microsoft has released a patch just two days after the Patch Tuesday for the SMBv3 vulnerability CVE-2020-0796. This vulnerability could allow attackers infect a computer inside of a network, and then spread to subsequent computers using the TCP port 445 automatically.

This remote code execution flaw impacts Windows 10 devices and affects the TCP port 445 which is by default used for file sharing, printer services and other communications within the network.

What is SMBv3 vulnerability?

The vulnerability lies in the Server Message Block (SMBv3) which would allow attackers to send a crafted malicious packet to the targeted SMBv3 server and lure the users to connect their machine to this server and subsequently the attacker could launch worms into the network thus affecting all the computers that are interconnected.

This vulnerability is similar to the EternalBlue vulnerability which was the reason behind the WannaCry and Petya attacks in 2017.

How to install this KB4551762   update?

Windows will automatically update your devices with this latest patch, while if in case you need the standalone update then visit the Windows Update Catalog website, and for Windows Server Update Services this update will automatically sync with WSUS once the admin configures the product as Windows 10, version 1903 and later with security updates as the classification.

Is you are an end user and have enabled automatic Windows updates this would be patches automatically, else please manually update your Windows before the SMB vulnerability gets exploited. Moreover, if you are a business please ensure you deploy these patches to all your Windows 10 devices including servers before it is too late. Though deploying a patch in the early stages could be troublesome, this is a critical wormable vulnerability and hence please ensure the patches are deployed to your systems right away.

Subscribe to ‘The Cybersecurity Times’, for daily alerts on cyber events. You can also follow us on FacebookLinkedinInstagramTwitter and Reddit.

Share the article with your friends
John Greenwood

He has been working with Cybersec and Infosec market for 12+ years now. Passionate about AI, Cybersecurity, Info security, Blockchain and Machine Learning. When he is not occupied with cybersecurity, he likes to go on bike rides!

Recent Posts

Best Microsoft Intune Alternatives: Top 5 MDMs to Consider

Explore the top 5 best Microsoft Intune alternatives, comparing key features, user reviews, and capabilities…

2 days ago

Top 7 Best Smartphones with Best Security Features in 2024

Discover the top 7 smartphones of 2024 with best security features, offering privacy, performance, and…

3 weeks ago

Top 11 Log Management Tools for Efficient System Management

Discover the top 11 log management tools for efficient system management and monitoring. Learn about…

2 months ago

Top 5 Threat Intelligence Tools For 2024

Explore the top 5 threat intelligence tools, their features, and how they enhance cybersecurity against…

2 months ago

Privileged Access Management: 5 Best PAM Solutions in the Market

Explore the top 5 best PAM Tools, market trends, and expert insights to secure the…

2 months ago

Apple Device Management: Top Solutions for iOS and macOS Management

Explore the top solutions for Apple Device Management including to iOS Device Management and macOS…

2 months ago