Header Ads


Home windows PrintNightmare bought patched — however Microsoft discovered a lingering nasty bug

Home windows customers all over the world collectively breathed a sigh of aid when Microsoft introduced that it issued a patch for a important safety flaw dubbed “PrintNightmare,” a nasty printer bug that, if exploited by hackers, wreaks havoc in your PC.

Nevertheless, this PrintNightmare is not over but. The Redmond-based tech large introduced that it’s investigating a lingering, perilous bug that offers malicious actors entry to your knowledge with system-level privileges.

Home windows PrintNightmare vulnerability persists

As we reported in early July, Microsoft introduced that it was investigating a repair for an alarming exploit throughout the Home windows Print Spooler Service, a program that helps PCs work together with printers.

Days later, the Redmond-based tech large issued a short lived repair for the important printer bug. Sadly, after the emergency patch rolled out, experiences about printer failures started flooding in. Affected Home windows customers had been suggested to uninstall the replace.

On Tuesday, Microsoft launched an official patch for the PrintNightmare flaw. Nevertheless, there’s nonetheless a lingering bug that must be squashed. This safety flaw, tracked as CVE-2021-34481, is a vulnerability that offers malicious actors enhanced privileges.

“An attacker who efficiently exploited this vulnerability might run arbitrary code with SYSTEM privileges. An attacker might then set up applications; view, change, or delete knowledge; or create new accounts with full consumer rights,” Microsoft mentioned in its disclosure.

There isn’t any repair for this bug but, however there may be workaround resolution that entails disabling the Home windows Print Spooler service. Learn the way to do that right here. When Microsoft rolls out an official patch for this flaw, we’ll hold you up to date.

Supply hyperlink

from WordPress https://ift.tt/3z5Ukt7

No hay comentarios

¿Tienes algo que decir? ¡Vamos adelante!

Con la tecnología de Blogger.