Microsoft rushed out a patch for the PrintNightmare flaw, but it doesn’t fix everything


Microsoft found itself in a huge bind a few days ago. A security report inadvertently detailed an exploitable issue in various Windows versions. Dubbed the Windows PrintNightmare bug, the printer-related unpatched vulnerability would allow attackers to execute code remotely on systems. Microsoft hurried out a Windows PrintNightmare patch that’s available to install right away. The fix works on Windows 10 version 1607, Windows Server 2012, and Windows Server 2016. The patch isn’t perfect, however. While Windows users should update their systems as fast as possible to gain protection against remote attacks, some issues remain.

Today’s Top Deal AirPods Pro are finally back in stock… at the lowest price since Prime Day! List Price:$249.00 Price:$197.00 You Save:$52.00 (21%) Available from Amazon, BGR may receive a commission Buy Now Available from Amazon BGR may receive a commission

The update addresses the main issue with the bug. With that in mind, Windows system administrators should deploy the patch as soon as possible.


What does the Windows PrintNightmare patch do?

Vulnerabilities found in the printing mechanism of Windows would allow a hacker to “gain full control on all windows environments that enable printing.” That’s according to the head of cyber research at Check Point, Yaniv Balmas, who talked to The Hacker News about the problem. “These are mostly working stations but, at times, this relates to entire servers that are an integral part of very popular organizational networks. Microsoft classified these vulnerabilities as critical, but when they were published, they were able to fix only one of them, leaving the door open for explorations of the second vulnerability.”

The Windows PrintNightmare security issue (CVE-2021-34527) concerns the Windows Print Spooler service. Specifically, the main worry is with non-administrator users with access to local networks who could load their own printer drivers. That’s no longer a problem.

“After installing this [update] and later Windows updates, users who are not administrators can only install signed print drivers to a print server,” Microsoft explained. “Administrator credentials will be required to install unsigned printer drivers on a printer server going forward.”


A security issue remains

Even so, a security issue remains. The Windows PrintNightmare patch addresses only a part of the problem. That’s “the Remote Code Execution (RCE via SMB and RPC) variants of the PrintNightmare, and not the Local Privilege Escalation (LPE) variant,” CERT/CC vulnerability analyst Will Dormann told THN. This would allow attackers to abuse the latter and then gain system privileges.

THN says further tests show that exploits targeting the flaw could bypass the fixes and bring back remote code execution. But for that to happen, users would have to enable a specific Windows policy, Point and Print Restrictions.

“Point and Print is not directly related to this vulnerability, but the technology weakens the local security posture in such a way that exploitation will be possible,” Microsoft explained.


The THN report notes that one workaround is to enable security prompts for Point and Print. Limiting printer driver installation privileges to admins will further increase security.

Today’s Top Deal If you have a Nintendo Switch, you need to score this incredible Amazon deal! List Price:$54.98 Price:$46.98 You Save:$8.00 (15%) Available from Amazon, BGR may receive a commission Buy Now Available from Amazon BGR may receive a commission

Stay connected with us on social media platform for instant update click here to join our  Twitter, & Facebook


We are now on Telegram. Click here to join our channel (@TechiUpdate) and stay updated with the latest Technology headlines.

For all the latest Technology News Click Here 

 For the latest news and updates, follow us on Google News


Read original article here

Denial of responsibility! TechAzi is an automatic aggregator around the global media. All the content are available free on Internet. We have just arranged it in one platform for educational purpose only. In each content, the hyperlink to the primary source is specified. All trademarks belong to their rightful owners, all materials to their authors. If you are the owner of the content and do not want us to publish your materials on our website, please contact us by email – [email protected]. The content will be deleted within 24 hours.

This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Accept Read More