A few days ago, information appeared about a vulnerability in the Microsoft SMBv3 protocol that allows infecting groups of computers. According to the Microsoft MSRC, this compromises PCs running Windows 10 version 1903, Windows Server version 1903 (Server Core installation), Windows 10 version 1909, and Windows Server version 1909 (Server Core installation). In addition, the protocol is used in Windows 8 and Windows Server 2012.
The flaw is said to allow the SMB server and SMB client to be compromised through the use of a specially crafted package. And although the exploit code was not published, Microsoft quickly responded and
KB4551762 like
But KB4540673 seems to be
Thus, a kind of scheme has already been formed in Redmond: to fix something while breaking something else. At the moment, the problem with updates is not recognized in the company, so you should not expect a quick solution.
Source: 3dnews.ru