Now there is complete code for the still not patched Windows SMB v2 vulnerability has been reported to the public. This increases the likelihood for remote in-the-wild code execution attacks. What should users do? According to Ryan Naraine with ZDNet (link to article): "Until Microsoft issues a patch, vulnerable Windows users should immediately implement the one-click “fix-it” workaround that’s available. The fix-it package, which was added to Redmond’s pre-patch advisory, effectively disables SMBv2 and then stops and starts the Server service. It provides temporary mitigation from remote code execution attacks targeting the known — and still unpatched — vulnerability."