Multiple remote code execution vulnerabilities were identified in Microsoft Windows Print Spooler Service named “PrintNightmare”, a remote attacker could exploit these vulnerabilities to trigger remote code execution with SYSTEM privileges on the targeted system. The attacker could then install programs; view, change, or delete data; or create new accounts with full user rights by exploited the captioned vulnerability.
System administrators are strongly recommended to apply the security updates and take remedial measures whereas possible.
Critical
All versions of Windows are vulnerable.
[Update] Windows updates released 10 August 2021 and later will, by default, require administrative privilege to install drivers. Please refer to KB5005652—Manage new Point and Print default driver installation behavior (CVE-2021-34481) for details.
Updated on: 25 Sep 2021
Cookie | Duration | Description |
---|---|---|
cookielawinfo-checkbox-analytics | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics". |
cookielawinfo-checkbox-functional | 11 months | The cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional". |
cookielawinfo-checkbox-necessary | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary". |
cookielawinfo-checkbox-others | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other. |
cookielawinfo-checkbox-performance | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance". |
viewed_cookie_policy | 11 months | The cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data. |