Header AD

Microsoft fixes PrintNightmare vulnerability but leaves it open to local attacks

Microsoft has gone out of its way this week to fix a vulnerability known as 'PrintNightmare'. First officially acknowledged by Microsoft on July 1, according to Complete I.T. Blog, the vulnerability meant any instances where Microsoft Windows Print Spooler service was running, a PC would be left open to attackers, who could remotely execute malicious code at will.

The news of a fix to the vulnerability, filename CVE-2021-34527, came to our attention via @Msftsecresponse on Twitter:

See more

Printers are a relatively common target for hackers trying to take control of machines, and once they find themselves with system privileges, they can easily shuffle your data, delete or copy important files, even create new accounts with admin rights, along with countless other sneaky activities.

Perfect peripherals

(Image credit: Colorwave)

Best gaming mouse: the top rodents for gaming
Best gaming keyboard: your PC's best friend...
Best gaming headset: don't ignore in-game audio

With one of the only workarounds being the system admin manually disabling the Print Spooler service—unhelpful if you need to use it on a daily basis—it comes as a great relief that Microsoft has finally rolled out a patch.

But the patch isn't a full fix, leaving Print Spooler users open still to local attacks. As noted by Tijs Hofmans over at tweakers, "It is still possible to perform a local privilege escalation. To prevent this, users can disable the Point&Print functionality."

You can find the Microsoft Windows Print Spooler security updates for here, anyway. Just be aware of any dodgy looking, probably hood-wearing characters using your local network. That's what hackers look like, right?

Microsoft fixes PrintNightmare vulnerability but leaves it open to local attacks Microsoft fixes PrintNightmare vulnerability but leaves it open to local attacks Reviewed by Unknown on July 07, 2021 Rating: 5

No comments

Post AD