Microsoft has released a fix for the Print Spooler backend vulnerability in all supported versions of Windows.
The first patch update excluded Windows 10 version 1607 and Windows Servers 2012 and 2016, but now a patch has been released for them as well.
Instructions for installing the patch, depending on the version, can be found on the Microsoft Support website behind this link.
A critical vulnerability in the spooler service was named “PrintNightmare”. The Cyber Security Center reported the vulnerability last week and instructed organizations to immediately disable Print Spooler.
A particularly embarrassing vulnerability was the fact that Microsoft initially listed two separate security holes under one CVE tag (CVE-2021-1675), but only one of them.
Security researchers thought both vulnerabilities had been patched, so code was released on GitHub that would allow attackers to take control of even updated Windows systems. Microsoft later reported the vulnerability CVE-2021-34527 to another vulnerability, and this vulnerability has now been patched.
Source: Tivi by www.tivi.fi.
*The article has been translated based on the content of Tivi by www.tivi.fi. If there is any problem regarding the content, copyright, please leave a report below the article. We will try to process as quickly as possible to protect the rights of the author. Thank you very much!
*We just want readers to access information more quickly and easily with other multilingual content, instead of information only available in a certain language.
*We always respect the copyright of the content of the author and always include the original link of the source article.If the author disagrees, just leave the report below the article, the article will be edited or deleted at the request of the author. Thanks very much! Best regards!