The company has released an urgent update that eliminates dangerous vulnerabilities in several versions of desktop operating systems. With it, attackers can remotely intercept PC control using a standard system tool, which is enabled by default by most users.
Kyiv. Ukraine. Ukraine Gate – July 10, 2021 – Technology
The PrintNightmare ( CVE-2021-34527 ) vulnerability is a “hole” in the Print Queue Manager service that was discovered in early July. It allows attackers to use remote code execution: install applications, modify data, and create new accounts with full administrator privileges.
Microsoft has already acknowledged the vulnerability, which has received critical status, and soon released a patch that eliminates it. Relevant fixes were received by Windows Server 2019, Windows Server 2012 R2, Windows Server 2008, Windows 8.1, Windows RT 8.1, and almost all builds of Windows 10. There was a “patch” for the outdated Windows 7, support for which was discontinued last year.
Earlier, the company said it had received evidence of actual operation, and urged users to install security updates. Alternatively, you can completely disable the print service or support incoming remote printing through the appropriate Group Policy. In the latter case, the operation will retain the ability to print locally when connected directly to a PC.
Read Also: A New Version of Windows from Microsoft This Month
Source: Ukrgate