PrintNightmare: Microsoft warns of critical vulnerability in Windows that is not yet patched and is being exploited

Microsoft has issued a warning a couple of new zero day bug that impacts all variations of Home windows. Though it has not been rated but, it’s a distant code execution vulnerability, which most likely places it on the most important degree.

Vulnerability CVE-2021-34527, which is being investigated, impacts the Home windows Spooler Service (Home windows Print Spooler) Y permits an attacker to remotely execute code on the system with elevated privileges.


A proof of idea of the exploit was revealed by chance

Sangfor Safety Researchers published a proof of concept of the bug referred to as PrintNightmare on June 29 by chance, they apparently believed that Microsoft had already corrected the bug. Nevertheless, this was not the case they usually shortly deleted it, albeit too late as a result of it was copied and a fork was revealed on GitHub.

It took Microsoft a few days to publish its safety advisory with suggestions and workarounds for now, because the vulnerability has not been patched. The corporate additionally warns that the bug is being actively exploited.

When the Home windows Print Queue service incorrectly performs privileged file operations, an attacker might run arbitrary code to put in packages; view, change or delete knowledge; or create new accounts with full person rights

The vulnerability existed earlier than June 2021, so Microsoft recommends putting in June safety updates on all supported variations of Home windows. The corporate is aware of that The vulnerability code exists in all variations of Home windows, however they’re investigating whether or not the bug could be exploited in all of them.

The Print Queue Service runs by default in Home windows, the corporate recommends disable service (if that is an possibility for the corporate), or disable distant printing by way of Group Coverage Editor. Different suggestions embody disabling it on Area Controllers and methods that don’t print.

Be the first to comment

Leave a Reply

Your email address will not be published.


*