CVE-2020-0796 developments should be tracked by security professionals for a future patch to prevent malware infections

Microsoft issued Security Advisory ADV200005 on late Tuesday about a “Critical“-rated Server Message Block (SMB) 3.1.1 vulnerability.   The vulnerability is currently present in newer supported Windows client and server systems, namely versions 1903 and 1909 of Windows 10 and Windows Server.  An exploit of the SMB 3 vulnerability, which could enable remote code execution on a network, can be triggered by sending a “specially crafted packet to a targeted SMBv3 Server.

WORKAROUND: Microsoft’s advisory on SMB 3 contains a link to a related support article that offers details on how to limit SMB connections, principally by blocking Port 445 connections, both from and to the Internet.  It is unlikely that any SMB communication originating from the internet or destined for the internet is legitimate