SMBv1 Windows Exploit “Fix” Problem – Why Disable Auto Updates?

New information has come to our attention that there is a specific Windows patch, which aims to address issues in the SMBv1 of Windows, more specifically removing it. SMB is in several versions and it stands for Server Message Block protocol and it is in v1, v2 and v3 and the v1 has been related to a lot of exploits over time, resulting in people discarding their older printers and hardware, supporting this protocol. But since the new patch Tuesday coming to the computers of Windows users contains a buggy fix, it is advisable for users to avoid this fix by disabling their updates.

The SMBv1 Vulnerability “Fix” – Why It’s Risky?

Since the recent Microsoft updates, the Windows 10 version 1803 was pushed to computers that were not set to receive it as an update and despite Windows 7 computers have been detected to stil install Windows 10 automatically, it is important for people to be on alert.

The 1803 version of Windows 10 has the SMBv1 running and some devices are set up to have it. The Microsoft user community has long known of the problems that are related to SMBv1 primarily in terms of security. The whole problem, according to the user guenni in his blog post is that ever since 2017, Microsoft has announced that it will expire, but it is still remaining on some computers. The sole vulnreability is well concealed within the activation of the SMBv1, which is a rather risky step, because it does not fix the network issues that are related to it. So the version 1803 of Windows 10 has the so-called “missing SMBv1” issue. After there is an update of Windows 10, the SMBv1 issue is not solved, since if you do not use SMBv1 for 15 days after it (Read more...)

*** This is a Security Bloggers Network syndicated blog from How to, Technology and PC Security Forum authored by Vencislav Krustev. Read the original post at: