A few days ago a serious security flaw was discovered in the Windows spooler service, which was baptized as PrintNightmare. According to analysts, the vulnerability on affected computers allows remote code execution with system-level privileges.

The magnitude of the inconvenience has been such that Microsoft has released an emergency update covering a wide range of versions of your operating system. In fact, the Redmond corporation has had to create a patch for Windows 7, despite the fact that said operating system is officially out of support.

In accordance with The Verge, the update To provide a solution to PrintNightmare, it is now available for Windows Server 2008, Windows Server 2012 R2, Windows Server 2019, Windows 8.1 and Windows RT 8.1. The update has also been released for various editions of Windows 10, although it is not yet available for version 1607 of said software. What’s new for Windows Server 2012 and Windows Server 2016 is expected soon.

PrintNightmare, a serious failure in the Windows print queue

Photo by Moritz erken on Unsplash

When the existence of PrintNightmare became known, a significant concern was generated among users. The spooler service runs by default on all versions of Microsoft’s operating system, so the threat level is really important.

Initially, the Redmond corporation’s recommendation was to disable printing, both locally and remotely. In this way, hackers they could not continue to exploit this serious flaw in software security. Clearly this workaround would not be feasible for all users but it would give the company time to move forward with the emergency patch.

READ:  Thousands of Boeing 737s under inspection for possible switch failures

“Microsoft has completed the investigation and released security updates to address this vulnerability. […] We recommend that you install them immediately, “Microsoft posted, referring to PrintNightmare.

The security update to resolve this critical vulnerability is already available, so pay attention to Windows update for installation. In the following link you can see the full list of versions of the operating system that are already receiving the patch to close this flaw.

Leave a Reply