Mitigation
The following mitigating factors may be helpful in your situation: By default the iSCSI Initiator client application is disabled, in this state an attacker cannot exploit this vulnerability. For a system to be vulnerable, the iSCSI Initiator client application would need to be enabled.
Mitigation
The following mitigating factors might be helpful in your situation: Only x86 or 32-bit based versions of Windows are affected by this vulnerability.
FAQ
How could an attacker exploit the vulnerability? An attacker could exploit the vulnerability by sending a specially crafted malicious DHCP discovery request to the iSCSI Discovery Service on 32-bit machines. An attacker who successfully exploited the vulnerability could then gain the ability to execute code on the target system.