Your Ultimate Information Platform

Microsoft rolls out emergency patch for important PrintNightmare flaw



Fixing a severe safety gap within the Home windows Print spooler service, the patch is on the market for nearly all variations of Home windows, even Home windows 7.


Picture: iStockPhoto/maxkabakov

Microsoft has deployed a patch for a vulnerability so important that even older, unsupported variations of Home windows are receiving it. On Tuesday, the corporate rolled out a repair for the PrintNightmare flaw, an issue that might enable an attacker to take over a compromised pc to put in software program, modify information and create new consumer accounts. Microsoft clearly thought of the flaw so extreme that it launched the patch out of band this week somewhat than wait till subsequent week’s July Patch Tuesday.

SEE: Guidelines: Securing Home windows 10 programs (TechRepublic Premium)

Accessible by way of Home windows Replace, the patch is on the market for many variations of Home windows for shoppers and servers, together with Home windows 7, 8.1 and 10, in addition to Server 2004, 2008 and 2019.

The one variations with out an obtainable patch are Home windows 10 Model 1607, Home windows Server 2012, Home windows Server 2012 (Server Core set up), Home windows Server 2016 and Home windows Server 2016 (Server Core set up). Microsoft stated that these variations might be up to date shortly after July 6.

Particular person customers ought to test Home windows Replace to obtain and set up the patch, whereas organizations ought to deploy the replace by way of their patch administration system.

This general drawback has been difficult as a result of it concerned two completely different vulnerabilities with the Home windows Print spooler, a service that queues up and manages print jobs. Often known as CVE-2021-1675, the primary flaw was patched by way of Microsoft’s June 2021 safety updates.

SEE: The way to handle passwords: Finest practices and safety ideas (free PDF) (TechRepublic)

The second flaw, dubbed CVE-2021-34527 and nicknamed PrintNightmare, pointed to a difficulty in RpcAddPrinterDriverEx(), a operate that lets customers set up or replace a printer driver. Till Tuesday, July 6, this flaw was unpatched, main Microsoft and the Cybersecurity and Infrastructure Safety Company to advise directors to disable the Home windows Print spooler service in area controllers and programs not used for printing.

The safety replace launched on and after July 6 consists of fixes for each flaws. Anybody unable to put in the replace is suggested to test the FAQ part in CVE-2021-34527 for steps on defending their programs from the vulnerability. Info on putting in new printer drivers after making use of the replace is accessible in Microsoft’s KB5005010 help doc.

As a result of each vulnerabilities exist within the 40 completely different variations of Microsoft Home windows, firms and common customers are in danger, in accordance with Dirk Schrader, international VP for safety analysis at New Internet Applied sciences. Attackers may infiltrate massive organizations for information extraction and encryption and infect particular person customers to broaden botnets or launch cryptomining networks, Schrader stated.

Additionally see


Leave A Reply

Your email address will not be published.