PrintNightmare vulnerability explained: Exploits, patches, and workarounds

PrintNightmare vulnerability explained:  Exploits, patches, and workarounds

Microsoft has started releasing emergency security updates to fix a publicly disclosed remote code execution vulnerability in the Windows printing functionality that could allow attackers to take full control of vulnerable systems.

The vulnerability, dubbed PrintNightmare and tracked as CVE-2021-34527, is located in the Windows Print Spooler service and the public exploits available for it are being improved. Organizations are urged to deploy the patches as soon as possible or disable inbound remote printing until the patches can be applied.

[ Learn how to harden Windows 10 for maximum security. | Get the latest from CSO by signing up for our newsletters. ]

To read this article in full, please click here



Support the originator by clicking the read the rest link below.