A vulnerability has re-emerged that had been recorded for three months. In this case it is SMBGhost, an exploit that works as a gateway to the operating system for hackers to access information without restriction.
This security flaw in Windows 10 computers has caused the attention of the United States Cybersecurity Agency, who have commented on their concern about this flaw with the Windows server message blocking protocol.
This is a problem initially solved by Microsoft months ago, where they published a security patch to prohibit the entry of attackers to the Server Message Block, a network protocol that allows the sharing of files, printers, among other elements between nodes of a network that has the connection of different computers.
Despite the fact that this was solved, the Security Agency mentioned that thousands of computers with Internet access are still vulnerable.
Because the code is “wormable”, it can spread across networks, similar to how ransomware NotPetya and WannaCry attacks spread around the world, causing billions of dollars in damage.
Another quite relevant curiosity is that in Windows 10 versions prior to 1903 it does not support the source of the error, known as SMBv3 1.1. In other words, if your computer didn’t get an upgrade from Windows 10 since May 2019, then your PC is not being vulnerable to this gap.