The Verge reports that Microsoft has issued an emergency patch to fix a critical flaw within Windows Print Spooler. This is being actively exploited by bad actors. The tech giant published a security advisory a few days ago to inform users about the PrintNightmare flaw. However, it did not name the bad actors currently using the vulnerability to infiltrate the victim’s computers.
Remote attackers can exploit the vulnerability to remotely execute code with system-level privileges. This gives them the ability to install programs on victims’ computers, modify or delete data, and create new accounts with full rights. To prevent hackers from gaining access, the vulnerability affects all Windows versions. The company recommended that users disable Print Spooler to disable local and remote printing. They can also disable only the inbound remote printing capability via Group Policy.
Microsoft has now issued patches for Windows Server, Windows 10 and Windows 8 — security updates for this OS stopped in January 2020 — platforms. The vulnerability was classified as Critical, which means that it could be exploited to allow code execution without user interaction. Microsoft asks users to immediately install the updates or take precautions to protect their systems if it isn’t.