Microsoft points warning for ‘PrintNightmare’ Windows vulnerability

"use strict"; var adace_load_614746b517510 = function(){ var viewport = $(window).width(); var tabletStart = 601; var landscapeStart = 801; var tabletEnd = 961; var content = ''; var unpack = true; if(viewport=tabletStart && viewport=landscapeStart && viewport=tabletStart && viewport=tabletEnd){ if ($wrapper.hasClass('.adace-hide-on-desktop')){ $wrapper.remove(); } } if(unpack) { $self.replaceWith(decodeURIComponent(content)); } } if($wrapper.css('visibility') === 'visible' ) { adace_load_614746b517510(); } else { //fire when visible. var refreshIntervalId = setInterval(function(){ if($wrapper.css('visibility') === 'visible' ) { adace_load_614746b517510(); clearInterval(refreshIntervalId); } }, 999); }


Microsoft has warned customers of a brand new, unpatched Windows flaw that would enable attackers to execute code with system-level privileges remotely.

Dubbed ‘PrintNightmare,’ the safety flaw exists throughout the Windows Print Spooler service, which helps deal with printing jobs. Security researchers apparently revealed the flaw unintentionally.

According to The Verge, researchers at Sangfor published a proof-of-concept for the exploit and later eliminated it, however it had already been forked on GitHub. The group deliberate to element a number of 0-day vulnerabilities within the Windows Print Spooler service on the annual Black Hat safety convention later this month. However, it appears the researchers thought Microsoft patched the vulnerability after the corporate revealed patches for a distinct Windows Print Spooler flaw.

BleepingComputer reported that Microsoft revealed mitigation steering to assist customers scale back the specter of the flaw. Microsoft notes that the safety exploit impacts all variations of Windows, however the firm remains to be investigating if the vulnerability may be exploited on all Windows variations. Further, Microsoft says attackers are actively exploiting PrintNightmare.

There are at present no patches that repair the PrintNightmare exploit, however Microsoft is engaged on a repair. Until then, there are a couple of mitigation choices Microsoft steered. First, customers can disable the Print Spooler service to take away printing functionality domestically and remotely. Alternatively, customers can disable inbound distant printing by Group Policy. That would block inbound distant printing operations and may stop distant assaults utilizing the exploit.

Those inquisitive about utilizing both of the workarounds can discover directions on how you can implement them right here.

Source: Microsoft Via: The Verge, BleepingComputer

What do you think?

Written by Gideon


Leave a Reply

Your email address will not be published. Required fields are marked *