PrintNightmare: In statement Microsoft denies patch bypass is a real threat
Two days ago Microsoft released an out-of-band patch for the PrintNightmare Zero-day exploit that grants attackers full Remote Code Execution capabilities on fully patched Windows Print Spooler devices, and a day later several hackers showed that the patch could be easily bypassed.
Microsoft has now issued a statement to BleepingComputer denying that the bypass presented a realistic threat, saying:
“We’re aware of claims and are investigating, but at this time we are not aware of any bypasses,” continuing “We have seen claims of bypass where an administrator has changed default registry settings to an unsecure configuration. See CVE-2021-34527 guidance for more information on settings required to secure your system. ”
Microsoft presumably means enabling the installation of drivers without a warning, with the company insisting the default configuration is secure.
What is clear is that you need more than the patch to be truly safe. Read Microsoft’s full configuration guidance here.
PrintNightmare: In statement Microsoft denies patch bypass is a real threat
- aum
- 1
Recommended Comments
Join the conversation
You can post now and register later. If you have an account, sign in now to post with your account.
Note: Your post will require moderator approval before it will be visible.