[SANS ISC] New Windows Print Spooler Vulnerability – CVE-2021-34481, (Mon, Jul 19th)

A new, unpatched, vulnerability has been discovered in the Windows Print Spooler and is being tracked under CVE-2021-34481.  Discovered by Jacob Baines at Dragos, this one requires local access, so it is less of a nightmare than PrintNightmare, but unfortunately the result of exploitation is SYSTEM level privileges.

Unfortunately, the workaround is the same; Stop and disable the Print Spooler service, which, of course, will disable the ability to print, both locally, and remotely.

It appears that Jacob will not be providing more details until Def Con.

At this point there is no indication of whether or not Microsoft will be releasing an out of band patch for this vulnerability.

— Rick Wanner MSISE – rwanner at isc dot sans dot edu – Twitter:namedeplume (Protected)

(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.

Source: Read More (SANS Internet Storm Center, InfoCON: green)

You might be interested in …

[ZDNet] The US government just launched a big push to fill cybersecurity jobs, with salaries to match

All posts, ZDNet

Cybersecurity workers could get paid as much as the vice president. Source: Read More (Latest topics for ZDNet in Security)

Read More

[ThreatPost] Bug Exposed Eufy Camera Private Feeds to Random Users

All posts, ThreatPost

Customers panic and question parent company Anker’s security and privacy practices after learning their home videos could be accessed and even controlled by strangers due to a server-upgrade glitch. Source: Read More (Threatpost)

Read More

[BleepingComputer] Computer memory maker ADATA hit by Ragnar Locker ransomware

Taiwan-based leading memory and storage manufacturer ADATA says that a ransomware attack forced it to take systems offline after hitting its network in late May. […] Source: Read More (BleepingComputer)

Read More

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.