Microsoft warns about new vulnerability "PrintNightmare"

Published by

Click here to post a comment for Microsoft warns about new vulnerability "PrintNightmare" on our message forum
https://forums.guru3d.com/data/avatars/m/234/234122.jpg
Assumption is the mother of all f-ups. Proven again and again. When will people learn.
https://forums.guru3d.com/data/avatars/m/94/94406.jpg
If you have a printer: Go to "Edit Group Policies", select "Computer Configuration", select "Administrative Templates", select "Printers", and disable the option "Allow the print job manager to accept client connections"
I am on Win 10, I only have "Allow Print Spooler to accept client connections" so have disabled that instead.
https://forums.guru3d.com/data/avatars/m/174/174772.jpg
van_dammesque:

I am on Win 10, I only have "Allow Print Spooler to accept client connections" so have disabled that instead.
You can disable publishing it as well
https://forums.guru3d.com/data/avatars/m/273/273678.jpg
https://cdn.discordapp.com/attachments/247515315825672203/861568210569658398/unknown.png its disabled by default, unless you're sharing a wired printer amongst your local network. This exploit requires the installation of a compromised printer driver in the first place, it cannot be exploited simply by having client connections available. (or other trojan exploit) If your print domain is already infected, this exploit allows clients to be easily infected since the infected driver will be added to the print server store, clients could pull it down by clicking on or trying to print to it.
data/avatar/default/avatar03.webp
Webhiker:

Assumption is the mother of all f-ups. Proven again and again. When will people learn.
I think is more MS that should be speedier in fixin or disabling the policy with an update if they know the research came from an external lab
https://forums.guru3d.com/data/avatars/m/189/189827.jpg
Its "Print Spooler" on 7.
https://forums.guru3d.com/data/avatars/m/246/246171.jpg
How has MS not figured out yet that the reason their OS has always been plagued with security issues is because they keep opening up access to everything?
data/avatar/default/avatar21.webp
My understanding is that end users who have patched via WIndows Update in June are already protected/mitigated from this. The current issue is with businesses running Active Directory and so that will be patched soon. Meanwhile, there are mitigation workarounds to address this for business IT admins. Please correct me if I am wrong about this.
https://forums.guru3d.com/data/avatars/m/56/56686.jpg
printer spool service? i have had that "manual" for decades i only turn it on when I actual need to print something, and I almost never do that. which manybe 3 times year? if that and i turn right off after doing so. I knew there was reason why I turn off printer spool
data/avatar/default/avatar04.webp
another printer/spooler thing exploit wasn't that already a problem like 10 years ago (quick search found me 2010-2012-2013 already...) edit: thx tsunami completely forgot to do it when I installed my current pc from scratch
https://forums.guru3d.com/data/avatars/m/225/225084.jpg
I also have no use for printing services and have always disabled Printer Spool from way back as well as the other 2 printer services in Win10.
https://forums.guru3d.com/data/avatars/m/273/273678.jpg
dragonlord:

My understanding is that end users who have patched via WIndows Update in June are already protected/mitigated from this.
they aren't, because of a still ongoing microsoft habbit of adding authenticated users to domain services.
data/avatar/default/avatar07.webp
Astyanax:

https://cdn.discordapp.com/attachments/247515315825672203/861568210569658398/unknown.png its disabled by default, unless you're sharing a wired printer amongst your local network. This exploit requires the installation of a compromised printer driver in the first place, it cannot be exploited simply by having client connections available. (or other trojan exploit) If your print domain is already infected, this exploit allows clients to be easily infected since the infected driver will be added to the print server store, clients could pull it down by clicking on or trying to print to it.
Thank you. I hate when a vulnerability is just blurted out without any background or explanation from the very basic. It should include the extent of the vulnerabilities including vectors along with solutions or work arounds.