A couple of days ago, Microsoft has warned its users in an announcement about a major bug that installs the data of Windows users. However, according to the latest report, Microsoft addresses a major bug by issuing an emergency Windows that was detected in the Windows Print Spooler service.
The Windows Print Spooler service which was named ‘PrintNightmare’ was supposed to be highly dangerous in nature. According to several researchers, the bug ‘PrintNighmare has the ability to exploit by hackers to get access and control of a user’s system.
The company has ranked the bug as severe as the big has the ability to execute code on impacted devices. However, currently announcing a fix, Microsoft has pushed users to install the updates instantly.
The company said,
“Microsoft has completed the investigation and has released security updates to address this vulnerability. We recommend that you install these updates immediately. Note that the security updates released on and after July 6, 2021, contain protections for CVE-2021-1675. And the additional remote code execution exploit in the Windows Print Spooler service known as “PrintNightmare”, documented in CVE-2021-34527.”
Microsoft has published patches for Windows Server 2019, Windows Server 2012 R2, Windows Server 2008, Windows 8.1, Windows RT 8.1, and further supported versions of Microsoft Windows 10. However, the company still has to roll out patches for Windows Server 2012, Windows Server 2016, and Windows 10 Version 1607. According to the company, the security updates for these are going to be rolled out before long.
Moreover, according to a previous Bleepingcomputer report, the company took a few days to recognize the bug. Microsoft had notified users about the dangerous nature of the vulnerability that was detected in the print spooler.
The report also stated that the bug permitted the cybercriminals to install malicious programs, get access to admin rights, modify data and make new accounts utilizing the admin rights.
The Cybersecurity and infrastructure agency had promoted administrators to deactivate the Windows Print spooler service in systems and Domain Controllers that do not print.
The agency further added,
“Due to the possibility for exposure, domain controllers and Active Directory admin systems need to have the Print spooler service disabled. The recommended way to do this is using a Group Policy Object.”
For those who don’t know, the print spooler is a program that is accessible in the Windows operating system. It saves print jobs in the memory of the computer before the printer eventually prints it