ubuysa
The BSOD Doctor
We all remember that SMBv1 contained the vulnerability which the WannaCrypt ransomware malware from a year or so ago exploited. At the time Microsoft issued several patches and recommended that SMBv1 be disabled since it's only now used by legacy applications. A Microsoft advisory explained in its title that Windows 10 1709 and later would not have SMBv1 installed by default.
Having just clean installed Windows 10 1909 and done my usual looking around, I have discovered that the above statement about SMBv1 is not entirely accurate, at least where Home and Pro versions are concerned. These versions still contain the SMBv1 client by default after a clean installation. If the SMBv1 client is not used for 15 days in total (excluding the computer being turned off), it automatically uninstalls itself.
On checking in Windows Features on my clean installed 1909 version I discovered that not only is SMBv1 installed it's activated!
That means that for the first 15 days after a clean install of any current version of Windows 10 your system is vulnerable to the WannaCrypt ransomware attack - and any other malware that uses the long since discredited SMBv1 vulnerability.
Clearly Microsoft do this so that anyone with legacy applications that rely on SMBv1 will have them work seamlessly, but the price the rest of us pay for that convenience is the potential exposure of a well-known vulnerability for 15 (operational) days.
Thus, when clean installing any version of Windows 10 always go immediately into Windows Features and disable SMBv1.
Having just clean installed Windows 10 1909 and done my usual looking around, I have discovered that the above statement about SMBv1 is not entirely accurate, at least where Home and Pro versions are concerned. These versions still contain the SMBv1 client by default after a clean installation. If the SMBv1 client is not used for 15 days in total (excluding the computer being turned off), it automatically uninstalls itself.
On checking in Windows Features on my clean installed 1909 version I discovered that not only is SMBv1 installed it's activated!
That means that for the first 15 days after a clean install of any current version of Windows 10 your system is vulnerable to the WannaCrypt ransomware attack - and any other malware that uses the long since discredited SMBv1 vulnerability.
Clearly Microsoft do this so that anyone with legacy applications that rely on SMBv1 will have them work seamlessly, but the price the rest of us pay for that convenience is the potential exposure of a well-known vulnerability for 15 (operational) days.
Thus, when clean installing any version of Windows 10 always go immediately into Windows Features and disable SMBv1.
Last edited: