Last updated on August 15, 2021
- Windows 10 for 32-bit systems & x64-based systems
- Windows 10 Version 1607 for 32-bit systems & x64-based systems
- Windows 10 Versions 1809, 1909, 2004, 20H2, 21H1 for 32-bit systems, x64-based systems, and ARM64-based systems
- Windows 7 and 8.1 for 32-bit systems SP1 & x64-based systems SP1
- Windows RT 8.1
- Windows Server 2008 for 32-bit systems SP2 & x64-based systems SP2
- Windows Server 2008 R2 for x64-based systems SP1
- Windows Server 2012, 2012 R2, 2016 & 2019
- Windows Server 2008 for 32-bit systems SP2 (Server Core installation) & x64-based systems SP2 (Server Core installation)
- Windows Server 2008 R2 for x64 based systems SP1 (Server Core installation)
- Windows Server 2012, 2012 R2, 2016, 2019, version 2004 & version 20H2 (Server Core installation)
Microsoft officially confirmed a remote code execution vulnerability called “PrintNightmare” affecting windows print spooler is actively exploited by the attackers.
The vulnerability “PrintNightmare” exists in the Microsoft Print Spooler service due to a failure to restrict access to the RpcAddPrinterDriverEx() function. A remote authenticated user could exploit this vulnerability by sending a specially crafted request to an affected system.
- Executing unwanted applications
- Malware distribution
- Users are advised to check the following website for updates
Note – Workarounds listed below may impact existing business functions and should be implemented after proper assessment.
Disable the Print Spooler Service on Domain Controllers and systems that are not used for printing.
Disable inbound remote printing through group policy .
Users are also advised to restrict access to ports 445/TCP and 135/TCP at network perimeter.
The information provided herein is on an “as is” basis, without warranty of any kind.
Citation: SLCERT Cyber Security Alerts