Fully-functioning exploit code for the recently-revealed, but still unpatched vulnerability in Microsoft's SMBv2 networking protocol has been released in the Metasploit framework.

The exploit should allow the development of attacks installing malicious code on Windows Vista Service Pack 1 and 2 as well as Windows 2008 SP1 server. The shipping version of Windows 7 is not vulnerable. This raises the pressure on Microsoft to issue a patch quickly. The next regularly scheduled Patch Tuesday is October 13, two weeks from now.

If, in the meantime, you wish to protect yourself, you can follow the links in this Microsoft blog post to disable (or re-enable) the SMBv2 protocol. There are a number of significant mitigating factors as well: As long as you haven't explicitly shared a printer or folder on that system, it is protected by the Windows Firewall, and probably by 3rd party firewalls. If you choose the "Public" firewall setting, you're protected even if you share a printer or folder.

PC Magazine