Microsoft has warned users of this new vulnerability which is being actively exploited by the hackers.
The vulnerability is dubbed as PrintNightmare and it allows attackers to remotely execute code with system-level privileges, which is as critical and problematic as you can get in Windows.
Microsoft 0-day vulnerability in their print spooler service allows attackers to use remote code execution, so bad actors could potentially install programs, modify data, and create new accounts with full admin rights.
Microsoft has confirmed that the code that contains the vulnerability is in all versions of Windows. The Print Spooler service runs by default on Windows, including on client versions of the OS, Domain Controllers, and many Windows Server instances, too.
Microsoft is currently working on a patch for this vulnerability and recommends users to disable this service until then. There has been various vulnerabilities in the Windows print spooler service and Microsoft recommends disabling the service in non-printing devices.
Install NPAV on your device to keep them safe and secure from all kinds of cyber attacks. Use NPAV and join us on a mission to secure the cyber world.