Jump to content
Search In
  • More options...
Find results that contain...
Find results in...
  • Serious vulnerability in Windows Print Spooler "Print Nightmare" | jimiwikman.se
    Kryptera.se

    On Kryptera.se, writes the IT security specialist Jonas Lejon who has worked with encryption and qualified IT security for over 18 years. The site is independent and non-profit.

    Jonas is one of Sweden's foremost experts in cyber security. Feel free to contact him on telephone number 010 1889848 or jonas@triop.se if your organization needs help with cyber security. You can also contact me on LinkedIn or Twitter.

    This article has been reposted with permission from Jonas Lejon.

    Serious vulnerability in Windows Print Spooler "Print Nightmare"

    Posted , 40 views, 0 comments License CC-BY-4.0

    If you have the "Print Spooler" service enabled (which is the default), it means that anyone with access can execute code as SYSTEM against the Windows domain controller. At present, there is no patch from Microsoft. So take a break from your vacation and turn off the service immediately.

    From Tenable's blog:

    Quote

    Exploitation of CVE-2021-1675 could give remote attackers full control of vulnerable systems. To achieve RCE, attackers would need to target a user authenticated to the spooler service. Without authentication, the flaw could be exploited to elevate privileges, making this vulnerability a valuable link in an attack chain.

    More information from Microsoft: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-1675

     

    • Interresting 1

    User Feedback

    Recommended Comments

    There are no comments to display.



    Create an account or sign in to comment

    You need to be a member in order to leave a comment

    Create an account

    Sign up for a new account in our community. It's easy!

    Register a new account

    Sign in

    Already have an account? Sign in here.

    Sign In Now

×
×
  • Create New...