Microsoft has released an emergency patch to address a critical flaw in the Windows Print Spooler service that bad actors actively exploit, as noted by The Virgin. A few days ago, the technology giant released a security warning to warn users of the alleged flaw PrintNightmare, although it has not named the bad actors who are currently using it to infiltrate the victims ’computers.
Attackers who take advantage of the vulnerability can remotely execute code with system-level privileges, giving them the ability to install programs on victims’ computers, delete or change data, and create new accounts with access rights. complete users. The vulnerability affects all versions of Windows, and the company has advised users to disable Print Spooler to disable local and remote printing to prevent hackers from entering. They can also disable only incoming remote printing capability through Group Policy.
Now, after investigating the vulnerability, Microsoft has released patches for several versions of Windows Server, Windows 10, Windows 8 and even Windows 7 – security updates for this OS finished January 2020 – platforms. The vulnerability was classified as “Critical”, meaning that its “exploitation could allow code execution without user interaction”. Microsoft requires users to immediately install updates or take steps to protect their systems if they are unable to do so.
All products recommended by Engadget are selected by our editorial team, independent of our parent company. Some of our stories include affiliate links. If you buy something through one of these links, you can earn an affiliate commission.