SynopsisThe remote Windows host is using a vulnerable version of SMB.
DescriptionA remote code execution vulnerability exists in Microsoft Server Message Block 3.1.1 (SMBv3) protocol due to how it handles a maliciously crafted compressed data packet. An unauthenticated, remote attacker can exploit this to bypass authentication and execute arbitrary commands.
Note that this plugin works only if it can to connect to the IPC$ share anonymously using SMB dialect 3.1.1.
SolutionApply Cumulative Update KB4551762.