
Highlights
- Microsoft has begun distributing an emergency patch for its consumer devices to fix a vulnerability discovered in the Print Spooler service on consumer devices.
- Researchers found that the vulnerability, PrintNighmare, could be exploited by hackers to take control of a person’s system.
- Microsoft has issued a warning about several critical bugs that could exploit Home Service customer information.
Microsoft has released an urgent patch for Home Service that fixes a critical vulnerability in Home Service called PrintNightmare that became known last week. An attacker who effectively exploited this vulnerability could execute arbitrary code with system privileges. The attacker could configure the program to view, modify or delete information or create a new account with full personal privileges.
A few days ago, Microsoft issued a warning about several critical vulnerabilities that could be exploited to take control of Home Windows customer information. The company is now releasing an emergency patch for Home Services to address the vulnerabilities discovered in the Home Services print spooling service. Dubbed “PrintNightmare,” Home Services is considered particularly dangerous. Researchers found that hackers could exploit the “PrintNightmare” bug to take control of a user’s system.
Microsoft has classified the vulnerability as critical because it could lead to code execution on affected machines. In announcing the patch, Microsoft urges customers to activate the update immediately.” Microsoft has completed its investigation and is releasing security updates to address the vulnerability. Customers are encouraged to configure these updates immediately. In addition, security updates provided after July 6, 2021, will include CVE-2021-1675 and the code execution vulnerability in the home windows Print Spooler service (known as “PrintNightmare”) described in CVE-2021-34527. Note that this provides protection against
Releases of Microsoft
Microsoft has released patches for home windows Server 2019, home windows Server 2012 R2, home windows Server 2008, home windows 8.1, Home windows RT 8.1, and home windows 8.1. Patches have been released for each supported version of Windows 10. Microsoft will also provide patches for Home windows Server 2012, Home windows Server 2016, and Home windows 10 Model 1607. According to the company, these security updates may be offered earlier or later.
Read more – Elon Musk unveiled new features for the Cyber Truck
Earlier, the Bleeping computer reported that it took Microsoft a few days to recognize the bug. The company warned its customers about the discovered vulnerability in the print spools. According to the report, cybercriminals could exploit the vulnerability to install malware, gain administrative privileges, modify information, or use administrative privileges to create new accounts.
As per the recommendations from cybersecurity experts filmmakers should disable the print rewind services in their home theater to disable services you can use zone controllers and printless technologies. If you are using zone controllers then do not forget to disable print to the service as it will reduce the risk of public disclosure.
Printooler
The printooler is software available in the main window work system if you’re not familiar with it. It stores print jobs in the computer’s memory before the printer finally prints them.
On Tuesday, Microsoft said it had completed its investigation and distributed security updates to fix the vulnerability.
“We recommend that you configure these updates immediately. The security update, which will be available after July 6, 2021, includes protection against CVE-2021-1675 and other code execution vulnerabilities in the Home Windows Print Spooler service, known as “PrintNightmare.”
Last week, Microsoft warned Home Windows users that a critical vulnerability that could help hackers install malware and access sensitive information had not been fixed. The company also acknowledged that an attacker could use PrintNightmare to control affected systems.
Last Words,
By default, the Print Spooler service runs on the Home Windows operating system. This includes variants of the client operating system, zone controllers, and many Home Windows servers. A vulnerability in the Print Spooler service in Home Windows has been a headache for system administrators for years.
Microsoft has now disclosed vulnerabilities in Home Windows Server 2019, Home Windows Server 2012 R2, Home Windows Server 2008, Home windows 8.1, Home Windows RT 8.1, and Home Windows Us. Home Windows 10 includes several patches for supported variants and a security patch for Home Windows 7, which is no longer supported.