Microsoft shares mitigations for Windows PrintNightmare zero-day bug
A number of cybersecurity researchers reported that the patch released by Microsoft to fix the CVE-2021-1675 vulnerability only eliminates the privilege escalation attack vector. Computer systems that received the patch are still vulnerable to remote code execution, as Microsoft probably combined two different problems under the same CVE identifier.
The company has now officially confirmed that the remote code execution vulnerability known as PrintNightmare in the Windows Print Spooler service and the CVE-2021-1675 vulnerability that the tech giant patched last month are two different issues.
This remote code execution (RCE) bug—now tracked as CVE-2021-34527—impacts all versions of Windows. CVE-2021-34527 allows attackers to take over affected servers via remote code execution with SYSTEM privileges as it enables them to install programs, view, change, or delete data, and create new accounts with full user rights. Microsoft's security advisory provides risk mitigation measures, which include disabling the Print Spooler service, or disabling inbound remote printing – microsoft.com.
Source: bleepingcomputer.com
02 July 2021