346
133 shares, 346 points

Microsoft has released security updates to fix a vulnerability affecting the Windows Print Spooler service. The “PrintNightmare” vulnerability, discovered last week, allows attackers to remotely run malicious code and install programs with system privileges, modify existing programs, and create new accounts with full user rights. Microsoft immediately rolled out the emergency hotfix patch for all major Windows versions, from Windows 7 to Windows 10. In addition, Windows Server users were also provided with special secure updates to fix the critical flaw.

(mtag101702)

Versions of Windows that receive security updates to fix the PrintNightmare vulnerability include Windows Server 2004, Windows Server 2008, Windows Server 2012, Windows Server 2012 R2, Windows Server 2016, Windows Server 2019, Windows 7, Windows RT 8.1, Windows 8.1, and It is listed as Windows 10. Microsoft also states that the update includes protections for the issue registered as CVE-2021-34527.

(mtag101702)

(mtag101702)

Since the Windows Print Spooler service is present in all versions of Windows, the vulnerability affected all versions of Windows. The released security update does not yet cover all Windows versions. However, the company states that the update will be offered for the remaining versions shortly.

(mtag101702)

The PrintNightmare vulnerability was reported last week by researchers at Chinese cybersecurity firm Sangfor Technologies. For systems that have not yet received the security update, the threat may still be present. That’s why the company recommends disabling the Print Spooler service manually. However, let’s also mention that you can manually download the released security update from here.

(mtag101702)


Like it? Share with your friends!

346
133 shares, 346 points

What's Your Reaction?

hate hate
613
hate
confused confused
122
confused
fail fail
981
fail
fun fun
858
fun
geeky geeky
736
geeky
love love
368
love
lol lol
490
lol
omg omg
122
omg
win win
981
win

0 Comments

Your email address will not be published. Required fields are marked *