Dan Tentler, founder of security firm Phobus Group, told Ars that more than 477,000 Samba-enabled computers exposed port 445, although it wasn't clear how many of them were running a vulnerable version of the utility. Tentler cited figures returned by the Shodan computer search engine. Researchers with security firm Rapid7, meanwhile, said they detected 110,000 devices exposed on the internet that appeared to run vulnerable versions of Samba. 92,500 of them appeared to run unsupported versions of Samba for which no patch was available.
Fortunately, there is a mitigation. Again, from the article:
Those who are unable to patch immediately can work around the vulnerability by adding the line
nt pipe support = no
to their Samba configuration file and restart the network's SMB daemon. The change will prevent clients from fully accessing some network computers and may disable some expected functions for connected Windows machines.
The patch came in fast, but the "Many eyes" took seven years for to "make the bug shallow".