New Windows exploit to show up as Zero day soon

Now there is complete code for the still not patched Windows SMB v2 vulnerability has been reported to the public. This increases the likelihood for remote in-the-wild code execution attacks. What should users do? According to Ryan Naraine with ZDNet (link to article): "Until Microsoft issues a patch, vulnerable Windows users should immediately implement the one-click “fix-it” workaround that’s available. The fix-it package, which was added to Redmond’s pre-patch advisory, effectively disables SMBv2 and then stops and starts the Server service. It provides temporary mitigation from remote code execution attacks targeting the known — and still unpatched — vulnerability."