Microsoft Windows is prone to a security vulnerability that may allow attackers to conduct spoofing attacks. Attackers can exploit this issue to spoof and impersonate a legitimate user. Other attacks are also possible.
Deploy network intrusion detection systems to monitor network traffic for malicious activity.
Deploy NIDS to monitor network traffic for signs of anomalous or suspicious activity. This includes but is not limited to unexplained incoming and outgoing traffic. This may indicate exploit attempts or activity that results from successful exploits.
Do not accept communications that originate from unknown or untrusted sources.
execute commands to mount SMB shares. Never follow directions from untrusted sources. Modify default configuration files to disable any unwanted behavior
Updates are available. Please see the references or vendor advisory for more information.