'Printer Catastrophe' Vulnerability Threatens All Versions of Windows
This vulnerability allows bad actors to exploit for remote code execution (RCE) and it has been dubbed "Printer disaster". According to the CERT Coordination Center, the problem is that the Windows Print Spooler does not restrict access to the RpcAddPrinterDriverEx() function. As a result, a remote attacker can take advantage of it to execute arbitrary code remotely under system privileges.
The RpcAddPrinterDriverEx() function is commonly used to install printer drivers remotely. With unrestricted access, an attacker could point to a driver on a remote server, causing the victim machine to execute arbitrary code with system privileges.
Microsoft says it is investigating the vulnerability. The software giant proposes two temporary solutions for IT administrators of organizations and businesses.
The first solution is to disable the Windows Print Spooler service but this will cause printing to be disabled both locally and remotely. The second solution is to disable remote printing via Group Policy. This will limit remote printing, but local printing will still work fine.
Microsoft says the vulnerability appears on all versions of Windows. However, it is not clear whether an attacker can exploit it on all versions of Windows.
You should read it
- Detecting an 8-year-old security flaw, affecting 150 HP printer models
- If you hack HP's printer, you will receive $ 10,000
- New zero-day vulnerability warning in Windows Search, Windows protocol nightmare getting worse
- GitLab patches critical vulnerability that allows hackers to take control of accounts
- Detects a vulnerability that threatens all Windows computers shipped from 2012 up to now
- Steps to fix PrintNightmare vulnerability on Windows 10
- The NSA issued an urgent warning about a critical vulnerability appearing in Windows servers
- Log4Shell zero-day vulnerability discovered, the new nightmare of enterprises
May be interested
- Warning: Babuk Locker Ransomware is Active Again, Attacking the Worldafter a 3-month hiatus under the name babuk locker, it has returned to creating custom ransomware executables that now target victims around the world.
- Google launches new platform to help prevent Supply Chain attackssupply chain attack is a very dangerous type of attack and often has serious consequences.
- NVIDIA Jetson chipset contains a series of security holes that allow data theft, DDoS attacksa series of new critical security vulnerabilities have been found in the jetson chip framework (nvidia) that could affect millions of active graphics cards worldwide.
- Most Android anti-virus software cannot detect malicious APK filesapk file containing malicious code is a method that hackers often use to attack android users. unlike ios, android users can download and install apps from third-party app stores or download the app's apk file and install it themselves.
- Paradise ransomware source code shared on hacker forumthe entire source code of the paradise ransomware has been shared on a hacker forum called xss.is. based on this source code, even novice cybercriminals can create their own custom ransomware.
- SolarMarker malware puts users at riskmicrosoft is tracking a series of attacks that use seo poisoning to infect targets with a remote access trojan (rat) that is capable of stealing victims' sensitive information and backing up their systems.