Breaking

Microsoft releases fix for the critical SMBv3 vulnerability- Patch now

Microsoft has released a patch just two days after the Patch Tuesday for the SMBv3 vulnerability CVE-2020-0796. This vulnerability could allow attackers infect a computer inside of a network, and then spread to subsequent computers using the TCP port 445 automatically.

This remote code execution flaw impacts Windows 10 devices and affects the TCP port 445 which is by default used for file sharing, printer services and other communications within the network.

What is SMBv3 vulnerability?

The vulnerability lies in the Server Message Block (SMBv3) which would allow attackers to send a crafted malicious packet to the targeted SMBv3 server and lure the users to connect their machine to this server and subsequently the attacker could launch worms into the network thus affecting all the computers that are interconnected.

This vulnerability is similar to the EternalBlue vulnerability which was the reason behind the WannaCry and Petya attacks in 2017.

How to install this KB4551762   update?

Windows will automatically update your devices with this latest patch, while if in case you need the standalone update then visit the Windows Update Catalog website, and for Windows Server Update Services this update will automatically sync with WSUS once the admin configures the product as Windows 10, version 1903 and later with security updates as the classification.

Is you are an end user and have enabled automatic Windows updates this would be patches automatically, else please manually update your Windows before the SMB vulnerability gets exploited. Moreover, if you are a business please ensure you deploy these patches to all your Windows 10 devices including servers before it is too late. Though deploying a patch in the early stages could be troublesome, this is a critical wormable vulnerability and hence please ensure the patches are deployed to your systems right away.

Subscribe to ‘The Cybersecurity Times’, for daily alerts on cyber events. You can also follow us on FacebookLinkedinInstagramTwitter and Reddit.

Share the article with your friends
John Greenwood

He has been working with Cybersec and Infosec market for 12+ years now. Passionate about AI, Cybersecurity, Info security, Blockchain and Machine Learning. When he is not occupied with cybersecurity, he likes to go on bike rides!

Recent Posts

Top 9 Best Log Management Tools for 2025

Discover the best log management tools for efficient system management and monitoring. Learn about the…

6 months ago

Top 4 Remote Support Tools for 2025- Best Remote Support Solution

Taking remote of devices and managing them will make thing simple for IT admins. In…

6 months ago

Top 5 Best Unified Endpoint Management (UEM) Software for 2025

In 2024, the Unified Endpoint Management Software market will continue to evolve and here are…

6 months ago

Top 5 Threat Intelligence Tools For 2025

Explore the top 5 threat intelligence tools, their features, and how they enhance cybersecurity against…

7 months ago

Top 5 Best Microsoft Intune Alternatives to Consider for 2025

Explore the top 5 best Microsoft Intune alternatives, comparing key features, user reviews, and capabilities…

8 months ago

Recast Software: Advanced Endpoint Management and Security Tools for IT Teams

Recast Software offers a suite of tools designed to enhance and simplify endpoint management in…

1 year ago