Snynet Solution Logo
MON - SUN: 10 AM - 6 PM
+60 11 5624 8319

Blog

Windows Print Spooler has yet another security flaw

Image Description

Microsoft has notified users of another vulnerability in the Windows Print Spooler, just days after addressing the PrintNightmare vulnerability in the same subsystem.

The latest bug, tracked as CVE-2021-34481, is a local privilege escalation vulnerability that can be exploited to give attackers enhanced privileges.

“An attacker who successfully exploited this vulnerability could run arbitrary code with SYSTEM privileges. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights,” notes Microsoft in its disclosure.

TechRadar needs you!

We're looking at how our readers use VPNs with streaming sites like Netflix so we can improve our content and offer better advice. This survey won't take more than 60 seconds of your time, and you can also choose to enter the prize draw to win a $100 Amazon voucher or one of five 1-year ExpressVPN subscriptions.

>> Click here to start the survey in a new window <<

Disable the spooler

Microsoft notes that to successfully exploit the vulnerability, the attacker must have physical access to a victim’s system. This makes the vulnerability less severe than those that can be exploited remotely, such as PrintNightmare.  

Despite this, Microsoft’s Exploitability Assessment notes that the local privilege escalation bug can likely be exploited. 

More worryingly however, Microsoft notes that a fix for the vulnerability doesn’t yet exist. Its suggested workaround while it works on the security fix, is to stop and disable the Print Spooler service, which will have the side-effect of disabling the computer’s ability to communicate with local and network printers robbing it of the ability to print. 

There were reports of publicly available exploits of the now-patched PrintNightmare exploits even as Microsoft was still working on a fix. However, CVE-2021-34481 wouldn’t seem as exciting to threat actors since a successful exploitation requires physical access to the computer.

Date

16 Jul 2021

Sources


Share


Other Blog

  • Faulty update mechanism puts millions of Dell devices at risk

    Threat actors could impersonate Dell and run malicious code on the impacted device, researchers find.

    Read More
  • Is a cloud enabled future the best way forward&quest;

    Automation and cloud computing have become a crucial part of businesses’ operating models, helping them to navigate the new normal.

    Read More
  • Microsoft Edge Legacy is dead, but the Chromium version is fast gaining traction

    Microsoft has pulled support for Edge Legacy and will now concentrate fully on the new Chromium-based version.

    Read More
  • The next great disruption: Tooling up for hybrid working

    We're about to enter a new world of hybrid working.

    Read More

Find Out More About Us

Want to hire best people for your project? Look no further you came to the right place!

Contact Us