![]() ![]() This effectively gives people control over a device, creating security risks. When exploited, the PrintNightmare vulnerability allows users with low privileges to open a command prompt with SYSTEM privileges. This change will take effect with the installation of the security updates released on August 10, 2021 for all versions of Windows, and is documented as CVE-2021-34481. The installation of this update with default settings will mitigate the publicly documented vulnerabilities in the Windows Print Spooler service. ![]() Today, we are addressing this risk by changing the default Point and Print driver installation and update behavior to require administrator privileges. Microsoft also explains that requiring higher privileges addresses the vulnerability: ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |