Windows

A new security flaw affects Windows systems. Researcher Laurent Gaffie announced the discovery of a vulnerability that would allow denial-of-service attacks to be carried out on, even, the most up-to-date systems through the exploitation of the SMB protocol.

Microsoft was informed of the vulnerability in September, but considering it low risk, has postponed applying the patch that fixes the bug.

Security breach affects Windows Server systems 2012 and 2016, as well as Windows systems 7 to Windows 10.

microsoft recommends that users and administrators disable smbv1.0 as a preventive measure, until the application of the patch.

To do this, on server systems you can mediate powershell with the following command::

Remove-WindowsFeature FS-SMB1

On Windows client systems 7 to Windows 10 the following command can be used at the command prompt:

Disable-WindowsOptionalFeature -Online -FeatureName smb1protocol

Microsoft planea lanzar el parche que solventa el fallo de seguridad este mes de Febrero.


Leave a Reply

Your email address will not be published. Required fields are marked *

More news
A cybercriminal manages to use AI to steal data from the Mexican Government
Read more »
Intec creates an AI that redefines the rules of the game in cybersecurity in the AI era.
Read more »
Una exfiltración de datos afecta a un proveedor de Adidas
Read more »
Se incrementan un 26% los incidentes de ciberseguridad
Read more »
Un ciberataque paraliza en Roma la Universidad La Sapienza
Read more »