On Tuesday, July 6, Microsoft announced the release of an emergency patch to address a security vulnerability that was discovered in the operating system. Coined PrintNightmare, the vulnerability (CVE-2021-34527) exists within the Windows Print Spooler service and could allow attackers to install programs, view and delete data, and create new user accounts with full rights.
Here is what you need to know:
- All Windows 10, Windows 7, and Server 2012+ operating systems are subject to vulnerability and should be patched immediately.
- As of Wednesday, July 7, Microsoft has released security updates for all supported versions of Windows listed in the security updates table in their CVE. This includes security updates for Windows Server 2012, Windows Server 2016 and Windows 10, Version 1607.
- If you are using patching services via Microsoft Windows Update or Windows Update for Business, the patch will arrive automatically.
- All Windows environments being managed by Core BTS have been patched.
The security of your environment is of the utmost importance to Core BTS, and we are here to help you protect your business from attack. We strongly encourage you apply these updates immediately. If you are unable to install these updates for any reason, our security specialists are standing by to help. Contact us here or at 1.855.COREBTS.