A new security flaw affects Windows systems. Researcher Laurent Gaffie announced the discovery of a vulnerability that would allow denial-of-service attacks to be carried out on, even, the most up-to-date systems through the exploitation of the SMB protocol.
Microsoft was informed of the vulnerability in September, but considering it low risk, has postponed applying the patch that fixes the bug.
Security breach affects Windows Server systems 2012 and 2016, as well as Windows systems 7 to Windows 10.
microsoft recommends that users and administrators disable smbv1.0 as a preventive measure, until the application of the patch.
To do this, on server systems you can mediate powershell with the following command::
Remove-WindowsFeature FS-SMB1
On Windows client systems 7 to Windows 10 the following command can be used at the command prompt:
Disable-WindowsOptionalFeature -Online -FeatureName smb1protocol
Microsoft planea lanzar el parche que solventa el fallo de seguridad este mes de Febrero.
