Microsoft Corporation, Microsoft Windows, Computer, Windows 10, Vulnerability knowledges "PrintNightmare" remote execution vulnerability in Windows
This is known as print nightmare and it’s affecting your windows, printers and you’re printing in windows. Now, according to microsoft, this is a remote code, execution, vulnerability and it affects the windows principler and the windows. Principler is a service that runs in the background, and that is responsible for all your printing and printing jobs in the windows operating system and microsoft, said they are investigating this vulnerability and have offered a workaround from you know to protect you from being exploited by this Vulnerability, so if we just pop over to the security guard from microsoft, we can see windows principally remote code, execution, vulnerability and it’s cve 202134527. Now, if we just quickly read the summary, microsoft is aware of and investigating a remote code, execution vulnerability that affects windows prince buehler and has assigned cve20213457 to this vulnerability. This is an evolving situation and we will update the cve as more information is available. So this briefly just describes what it is. A remote code, execution vulnerability exists, exists when the windows principle or service improperly, performs privileged file operations. An attacker who successfully exploited this vulnerability could run arbitrary code with system privileges. An attacker could then install programs, view view change or delete data or create new accounts with full user rights. So it’s quite a you know, it’s quite an important vulnerability that needs to be addressed, and basically they offer a workaround to this situation now i’m going to do this a little bit differently and the easiest way i can offer this work around with how i would Do it personally is: i would just go to my search typing services in the search, and this opens your background services in windows and just scroll down to print spooler, so we’re looking for p principle here we go there, it is there and it says this service Spools print jobs and handles interaction with the printer and what we’re going to do here is we’re just going to double click on it and you can see, startup type is automatic and what we’re going to do is we’re just going to go disabled and then we’re Going to stop the service and click apply.
Okay, and you will see here now principal is disabled, but just be aware that if you disable this and it’s not set to run automatically when um your computer starts, you won’t be able to print in. You know from windows, or you know, no printers will actually work and you won’t be able to print now. If we just carry on in the security guard, we can see that they say. Did the june 2021 update introduce this vulnerability. These are frequently asked questions. No, that microsoft says it didn’t, and they say you strongly recommends installing the june 2021 updates. So it looks like the quick solution to this is that you must make sure, as always, that your pc is up to date with the latest patches and cumulative updates. When microsoft rolls them out and what specific roles are known by the affected to be affected by the vulnerability domain controllers are factors affected, we are still investigating if other types of roles are also affected. So at the moment it looks like it’s more for enterprise on large networks and not really aimed at the home user, but i’m just posting this video and just to double check. Because if you have experienced anything, you know out of sorts with your printing and your printer. You could be affected by this security vulnerability but, as it says here, it’s more for domain controllers, and that is large networks and servers in enterprise corporations. And it basically says here at the end we are still investigating.
We will make this information available soon. So, as i said, if you have experienced any problems that have been mentioned, just go and disable the principal service like i showed you and then just wait for a fix to be rolled out by microsoft. So i just wanted to update you print nightmare. This is a new remote code, execution vulnerability that is apparently now making its way into uh domain networks um at the moment. But if you are a private home user, you know if you suspect anything wrong, just follow the steps that i’ve shown in this video.