Windows

A new security flaw affects Windows systems. Researcher Laurent Gaffie announced the discovery of a vulnerability that would allow denial-of-service attacks to be carried out on, even, the most up-to-date systems through the exploitation of the SMB protocol.

Microsoft was informed of the vulnerability in September, but considering it low risk, has postponed applying the patch that fixes the bug.

Security breach affects Windows Server systems 2012 and 2016, as well as Windows systems 7 to Windows 10.

microsoft recommends that users and administrators disable smbv1.0 as a preventive measure, until the application of the patch.

To do this, on server systems you can mediate powershell with the following command::

Remove-WindowsFeature FS-SMB1

On Windows client systems 7 to Windows 10 the following command can be used at the command prompt:

Disable-WindowsOptionalFeature -Online -FeatureName smb1protocol

Microsoft planea lanzar el parche que solventa el fallo de seguridad este mes de Febrero.


Leave a Reply

Your email address will not be published. Required fields are marked *

More news
Vimeo sufre una brecha de datos
Read more »
Booking.com suffers a data exfiltration of bookings
Read more »
La franquicia de gimnasios Basic-Fit sufre una exfiltración de datos
Read more »
New wave of scams using AI-cloned voices
Read more »
Una brecha en la Comisión Europea salpica unas treinta instituciones
Read more »