Patches to repair a extreme flaw within the Home windows Print spooler are actually out there for Home windows 10 Model 1607, Home windows Server 2012 and Home windows Server 2016.
Microsoft has now launched patches to guard all variations of Home windows in opposition to the important PrintNightmare flaw. On Tuesday, the corporate had deployed fixes to cowl most however not all editions of Home windows. On Wednesday, Microsoft patched the remaining variations of Home windows, based on an replace on its message heart web page.
SEE: Guidelines: Securing Home windows 10 methods (TechRepublic Premium)
Newly patched as of July 7 are Home windows 10 model 1607, all editions of Home windows Server 2012 (together with Server Core) and all editions of Home windows Server 2016 (together with Server Core). Which means all 40 flavors of Home windows now have a patch for this flaw, together with ones now not supported by Microsoft, equivalent to Home windows 7 and Home windows Server 2008.
Pushing out patches for all variations of Home windows, even unsupported ones, reveals how severe Microsoft thought-about this vulnerability. As one other signal, the corporate deployed the patch as an out-of-band replace, selecting to not wait till subsequent week’s Patch Tuesday to roll it out.
All particular person customers ought to examine Home windows Replace to obtain and set up the patch for his or her model of Home windows, whereas organizations ought to deploy the replace by way of their patch administration system. The updates are additionally out there by looking the Microsoft Replace Catalog for the precise Information Base quantity in your model of Home windows and through the use of the Home windows Server Replace Providers (WSUS).
Fixing this specific drawback with the Home windows Print spooler service was sophisticated as a result of Microsoft needed to patch two completely different flaws. Often known as CVE-2021-1675, the primary flaw was patched by way of Microsoft’s June 2021 safety updates. However that also left a second and extra severe flaw.
Dubbed CVE-2021-34527 and nicknamed PrintNightmare, the second vulnerability involved a problem in RpcAddPrinterDriverEx(), a operate that permits customers to put in or replace a printer driver. If exploited by an attacker, this one would have allowed them to take over a compromised pc to put in software program, modify knowledge and create new person accounts.
The safety updates launched on July 6 and July 7 embrace fixes for each flaws. Anybody unable to put in the updates is suggested to examine the FAQ part in CVE-2021-34527 for steps on defending their methods. Info on putting in new printer drivers after making use of the replace is accessible in Microsoft’s KB5005010 assist doc.