Microsoft has released an emergency software update to patch the vulnerability in SMBv3 protocol. The vulnerability is a remote code execution flaw that impacts Windows 10 and Windows Server versions 1903 and 1909. As of today, there are nearly 48,000 Windows systems vulnerable to the latest SMB compression vulnerability and accessible over the Internet. To exploit the vulnerability against a server, an unauthenticated attacker could send a specially crafted packet to a targeted SMB v3 server and convince a user to connect to it.
Source: https://thehackernews.com/2020/03/patch-wormable-smb-vulnerability.html