1. Home
  2. Cloud and Servers
  3. Safety
  4. Microsoft SMBv3 ADV200005

Microsoft SMBv3 ADV200005

Company Microsoft published a safety recommendation that was found in Microsoft Server Message Block 3.1.1 (SMBv3) and can allow the attacked to use remote start of code. Both the SMB server and SMB client are vulnerable. Attacker can exploit this vulerability by sending a specially edited packet.

Touched systems are Windows 10 and Windows Server (in versions 1903 and 1909), while in this moment there are no security updates. Microsoft recommended to turn off the compression via PowerShell command:

Set-ItemProperty-Path "HKLM:\SYSTEM\CurrentControlSet\Services\LanmanServer\Parameters" DisableCompression -Type DWORD -Value 1 -Force

Description of the whole problem can be found on the website of microsoft.com.

Updated on July 1, 2021

Was this article helpful?

Related Articles