• Home
    • What is
    • Computer security
      • Windows security
      • Mac security
      • Linux security
    • Mobile security
      • Android security
      • iOS Security
    • Data security
    • SCCM
    • Reviews
      • Case studies
    • Advertise
    • Contact
      • Privacy Policy
  • Subscribe now

    Loading
  • Home
  • What is
  • Computer security
    • Windows security
    • Mac security
    • Linux security
  • Mobile security
    • Android security
    • iOS Security
  • Data security
  • SCCM
  • Reviews
    • Case studies
  • Advertise
  • Contact
    • Privacy Policy
Home » Breaking Computer security Latest Cybersecurity News Windows security

Microsoft releases fix for the critical SMBv3 vulnerability- Patch now

John Greenwood Posted On March 13, 2020
0



SMBv3 Vulnerability

Microsoft has released a patch just two days after the Patch Tuesday for the SMBv3 vulnerability CVE-2020-0796. This vulnerability could allow attackers infect a computer inside of a network, and then spread to subsequent computers using the TCP port 445 automatically.

This remote code execution flaw impacts Windows 10 devices and affects the TCP port 445 which is by default used for file sharing, printer services and other communications within the network.

What is SMBv3 vulnerability?

The vulnerability lies in the Server Message Block (SMBv3) which would allow attackers to send a crafted malicious packet to the targeted SMBv3 server and lure the users to connect their machine to this server and subsequently the attacker could launch worms into the network thus affecting all the computers that are interconnected.

This vulnerability is similar to the EternalBlue vulnerability which was the reason behind the WannaCry and Petya attacks in 2017.

How to install this KB4551762   update?

Windows will automatically update your devices with this latest patch, while if in case you need the standalone update then visit the Windows Update Catalog website, and for Windows Server Update Services this update will automatically sync with WSUS once the admin configures the product as Windows 10, version 1903 and later with security updates as the classification.

Is you are an end user and have enabled automatic Windows updates this would be patches automatically, else please manually update your Windows before the SMB vulnerability gets exploited. Moreover, if you are a business please ensure you deploy these patches to all your Windows 10 devices including servers before it is too late. Though deploying a patch in the early stages could be troublesome, this is a critical wormable vulnerability and hence please ensure the patches are deployed to your systems right away.

Subscribe to ‘The Cybersecurity Times’, for daily alerts on cyber events. You can also follow us on Facebook, Linkedin, Instagram, Twitter and Reddit.

Share the article with your friends


CVE-2020-0796 patchKB4551762 updateMicrosoft patch SMBv3 vulnerabilityPatch for SMBv3 vulnerabilitySMBv3 patch downloadSMBv3 patch releaseSMBv3 vulnerability


Author

John Greenwood

He has been working with Cybersec and Infosec market for 12+ years now. Passionate about AI, Cybersecurity, Info security, Blockchain and Machine Learning. When he is not occupied with cybersecurity, he likes to go on bike rides!

Leave A Reply

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

  • Subscribe to our newsletter

    Loading
  • Windows security

    • Top 9 Best Log Management Tools for 2025
      September 20, 2025
    • Top 4 Remote Support Tools for 2025- Best Remote Support...
      September 18, 2025
    • Top 5 Best Unified Endpoint Management (UEM) Software...
      September 12, 2025
    • Top 5 Threat Intelligence Tools For 2025
      July 25, 2025
    • Top 5 Best Microsoft Intune Alternatives to Consider...
      July 23, 2025


  • About us

    Our vision is to deliver the trending and happening cyber events to the enthusiasts.

    We believe in delivering educational and quality content for hassle-free understanding of the subject.

  • Subscribe to our newsletter

    Loading
  • Follow us

  • Advertise with us

    You can reach us via Facebook, Linkedin, or Twitter for advertising purposes.


© The Cybersecurity Times 2022. All rights reserved.
Press enter/return to begin your search