*** Patch Windows 10 and affected Windows Server 2019 systems IMMEDIATELY, even where there is a potential business impact (unscheduled maintenance). Notify firstname.lastname@example.org if you anticipate delays in patching. ***
A patch is available (KB4551762)  for a remote code execution vulnerability for how Microsoft Server Message Block 3.1.1 (SMBv3) protocol handles certain requests. [2, 3]
- Microsoft Windows 10 version 1903
- Microsoft Windows 10 version 1909
- Microsoft Windows Server 2019 version 1903
- Microsoft Windows Server 2019 version 1909
Patch vulnerable systems IMMEDIATELY.
Ensure your system is receiving automatic updates - if not apply the patch manually.
Prioritize patching systems that connect from off-campus through VPNs or proxies.
If immediate patching is not an option and SMBv3 compression is not necessary, disable SMBv3 compression , or restrict access to the host by creating a firewall rule to block SMB traffic.