Microsoft fixes PrintNightmare vulnerability but leaves it open to local attacks
Microsoft has gone out of its way this week to fix a vulnerability known as ‘PrintNightmare’. First officially acknowledged by Microsoft on July 1, according to Complete I.T. Blog, the vulnerability meant any instances where Microsoft Windows Print Spooler service was running, a PC would be left open to attackers, who could remotely execute malicious code at will.
The news of a fix to the vulnerability, filename CVE-2021-34527, came to our attention via @Msftsecresponse on Twitter:
Microsoft has released updates to protect against CVE-2021-34527. Please see: https://t.co/QZATXCPXnxJuly 6, 2021
Printers are a relatively common target for hackers trying to take control of machines, and once they find themselves with system privileges, they can easily shuffle your data, delete or copy important files, even create new accounts with admin rights, along with countless other sneaky activities.
With one of the only workarounds being the system admin manually disabling the Print Spooler service—unhelpful if you need to use it on a daily basis—it comes as a great relief that Microsoft has finally rolled out a patch.
But the patch isn’t a full fix, leaving Print Spooler users open still to local attacks. As noted by Tijs Hofmans over at tweakers, “It is still possible to perform a local privilege escalation. To prevent this, users can disable the Point&Print functionality.”
You can find the Microsoft Windows Print Spooler security updates for here, anyway. Just be aware of any dodgy looking, probably hood-wearing characters using your local network. That’s what hackers look like, right?
Screw sports, Katie would rather watch Intel, AMD and Nvidia go at it. She can often be found admiring AI advancements, sighing over semiconductors, or gawping at the latest GPU upgrades. Her thirst for absurd Raspberry Pi projects will never be sated, and she will stop at nothing to spread internet safety awareness—down with the hackers.