New ActiveX Windows zero-day exploited: Microsoft alert itnews.com.au - get the latest breaking news, showbiz & celebrity photos, sport news & rumours, viral videos and top stories from itnews.com.au Daily Mail and Mail on Sunday newspapers.
Patches released for exploited Windows PrintNightmare bug itnews.com.au - get the latest breaking news, showbiz & celebrity photos, sport news & rumours, viral videos and top stories from itnews.com.au Daily Mail and Mail on Sunday newspapers.
By Juha Saarinen on Jul 1, 2021 10:53AM
Users advised to disable Print Spooler service on Windows.
Researchers from a Hong Kong based security vendor accidentally published a proof-of-concept for a new and unpatched vulnerability affecting the Print Spooler service on all current versions of Windows, sparking concerns that ransomware criminals could add the bug to their arsenals.
The exploit allows for both local privilege escalation and remote code execution and was published on Github by researchers from Sangfor ahead of their presentation at the Black Hat security conference.
It appears the Sangfor researchers wrongly thought their proof-of-concept referred to a recently patched critical Windows Print Spooler service vulnerability, CVE-2021-1675 with a Common Vulnerabilities Scoring System version 3.0 rating of 7.8 out of 10.