The vulnerability exists in a new feature that was added to Windows 10 version 1903 older versions of Windows do not support SMBv3.1.1 compression
You can disable compression to block unauthenticated attackers from exploiting the vulnerability against an SMBv3 Server with this PowerShell command line
Set-ItemProperty -Path „HKLM:\SYSTEM\CurrentControlSet\Services\LanmanServer\
Parameters“ DisableCompression -Type DWORD -Value 1 -Force
You can disable the workaround with this PowerShell command line