Microsoft has quickly patched the PrintNightmare vulnerability in Windows

The company has even released a fix pack for Windows 7 because the vulnerability in question is considered quite dangerous.

Microsoft has announced that PrintNightmare (CVE-2021-34527), a patch has been released for several versions of Windows. This vulnerability was found in the Windows Print Spooler service process, and by exploiting it, even remote code execution was possible with administrator privileges.

Because the Windows Print Spooler service process runs by default, Microsoft was forced to respond quickly, and patches were made available for Windows Server 2019, Windows Server 2012 R2, Windows Server 2008, Windows 8.1, Windows RT 8.1, and Windows 7 operating systems. systems and Windows 10 versions later than 1607. Earlier versions of Windows 10 and Windows Server 2012 and 2016 will receive the fix a little later, but these packages are already being made.

There are several options for users to upgrade, these are page below details where to download the fix packs for the appropriate operating systems. Microsoft has also introduced another older Print Spooler vulnerability (CVE-2021-1675) has also been corrected, it will also be settled.


Source: Hírek és cikkek – PROHARDVER! by prohardver.hu.

*The article has been translated based on the content of Hírek és cikkek – PROHARDVER! by prohardver.hu. If there is any problem regarding the content, copyright, please leave a report below the article. We will try to process as quickly as possible to protect the rights of the author. Thank you very much!

*We just want readers to access information more quickly and easily with other multilingual content, instead of information only available in a certain language.

*We always respect the copyright of the content of the author and always include the original link of the source article.If the author disagrees, just leave the report below the article, the article will be edited or deleted at the request of the author. Thanks very much! Best regards!