Microsoft has warned Windows users of an unpatched critical vulnerability that can help hackers install malicious programmes and access key data on their systems.
The critical flaw is present in the Windows Print Spooler service and is nicknamed 'PrintNightmare'.
The US national cyber agency has also admitted that the attacker can exploit 'PrintNightmare' to take control of an affected system.
"Microsoft is aware of and investigating a remote code execution vulnerability that affects Windows Print Spooler and has assigned CVE-2021-34527 to this vulnerability. This is an evolving situation," the company said in an update on Thursday.
A remote code execution vulnerability exists when the Windows Print Spooler service improperly performs privileged file operations.
"An attacker who successfully exploited this vulnerability could run arbitrary code with SYSTEM privileges. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights," Microsoft warned.
Microsoft said, "The code that contains the vulnerability is in all versions of Windows".
The Print Spooler service runs by default on Windows, including on client versions of the OS, Domain Controllers, and many Windows Server instances.
Vulnerabilities in the Windows Print Spooler service have been a headache for system administrators for years.
The US Cybersecurity and Infrastructure Security Agency (CISA) has encouraged administrators to disable the Windows Print spooler service in Domain Controllers and systems that do not print.
Microsoft is working on a patch and has asked users to disable the Windows Print Spooler service, or disable inbound remote printing through Group Policy.
If you haven't installed the latest batch of Windows updates on your system, do so and disable the print spool service.
"Exploits such as this underline how important it is to both securely authenticate users and be in a position to identify unusual network activity," Martin Lee, technical lead at Cisco Talos, told The Registrar.
--IANS
na/dpb
(Only the headline and picture of this report may have been reworked by the Business Standard staff; the rest of the content is auto-generated from a syndicated feed.)
Dear Reader,
Business Standard has always strived hard to provide up-to-date information and commentary on developments that are of interest to you and have wider political and economic implications for the country and the world. Your encouragement and constant feedback on how to improve our offering have only made our resolve and commitment to these ideals stronger. Even during these difficult times arising out of Covid-19, we continue to remain committed to keeping you informed and updated with credible news, authoritative views and incisive commentary on topical issues of relevance.
We, however, have a request.
As we battle the economic impact of the pandemic, we need your support even more, so that we can continue to offer you more quality content. Our subscription model has seen an encouraging response from many of you, who have subscribed to our online content. More subscription to our online content can only help us achieve the goals of offering you even better and more relevant content. We believe in free, fair and credible journalism. Your support through more subscriptions can help us practise the journalism to which we are committed.
Support quality journalism and subscribe to Business Standard.
Digital Editor
RECOMMENDED FOR YOU