The nightmare is over: the latest Windows 10 update fixes 44 vulnerabilities, including PrintNightmare

Microsoft has launched its common replace on the second Tuesday of every month (Patch Tuesday), and with it they’ve fixed 44 vulnerabilities, seven of which have been labeled as crucial, three have been zero days, and 37 have been vital.

Maybe the spotlight right here is that lastly PrintNightmare has a definitive patch. Keep in mind that it’s a vulnerability within the spooling system that impacts all variations of Home windows and that permits an attacker to remotely execute code on the system with elevated privileges.


PrintNightmare was found in late June and Microsoft started investigating the issue nearly instantly. Nonetheless, not solely did they take a very long time to ship a patch, however its launch and effectiveness have been fairly bumpy. With the Patch Tuesday August, it has lastly been fastened appropriately.

WINDOWS 10: 9 VERY USEFUL and LITTLE KNOWN TRICKS

Mounted bug in Home windows 10 and Home windows 11 that means that you can achieve full entry to the system with out having to crack the passwords


One other vital vulnerability that’s fastened with this patch is the vulnerability associated to Safety Account Supervisor (SAM), an issue that permits any person to entry Home windows Registry recordsdata and databases with out the necessity for elevated privileges.

This bug was found in mid-July, and impacts all supported variations of Home windows 10. The “good” information is that not less than Microsoft has not detected that the flaw was being actively exploited.

Windows 365 already has a price: here's what it costs to rent a cloud PC running Windows 10 or Windows 11 in the browser

Nonetheless, among the many zero day vulnerabilities listed within the replace is a “Home windows Replace Medical Service Elevation of Privilege Vulnerability” (CVE-2021-36948 ), and Microsoft signifies that it was being exploited. The element is that they don’t clarify how, or since when, or the place it was being exploited.

Be the first to comment

Leave a Reply

Your email address will not be published.


*