The Print Spooler can be disabled by passing the “Stop-Service -Name Spooler -Force” and “Set-Service -Name Spooler -StartupType Disabled” commands through PowerShell. Meanwhile, users on a Windows machine that is yet to receive the security fix are recommended to manually disable the Print Spooler service or disable inbound remote printing. Microsoft said that it would update the remaining Windows versions soon. However, the security updates list is currently limited to a few versions initially. Since the Windows Print Spooler service exists on all Windows versions, the vulnerability has impacted all Windows machines. Microsoft said that the updates contain protections for the issue that has been recorded as CVE-2021-34527. The list of Windows versions that have received the security updates to patch the PrintNightmare vulnerability comprises Windows Server 2004, Windows Server 2008, Windows Server 2012, Windows Server 2012 R2, Windows Server 2016, Windows Server 2019, Windows 7, Windows RT 8.1, Windows 8.1, and Windows 10. Windows Server users have also been provided with specific security updates to fix the critical flaw. Microsoft has brought the emergency patch for all major Windows versions - starting from Windows 7 to Windows 10. The vulnerability called “PrintNightmare,” that was discovered last week, allows attackers to remotely execute malicious code with system privileges and install programs, make changes in the existing programs, and create new accounts with full user rights. Microsoft has released security updates for Windows users to patch a security flaw impacting the Windows Print Spooler service.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |