0 Members and 1 Guest are viewing this topic. Read 1599 times.
As I have no printer I am safe ?
Yep, the update for Win10 was waiting to be installed.
The patch just issued by Microsoft does not fix the problem, apparently."An emergency patch Microsoft issued on Tuesday fails to fully fix a critical security vulnerability in all supported versions of Windows that allows attackers to take control of infected systems and run code of their choice,…"https://arstechnica.com/gadgets/2021/07/microsofts-emergency-patch-fails-to-fix-critical-printnightmare-vulnerability/Turning of the service manually, as described above, worked for me and persisted through a reboot of Windows.
You misunderstand the vunerability. The Print Spooler is on all computers, not only networked computers so all computer are effected. Why not apply the patch and be sure?Does the the Print Spooler service run by default, even with no printer attached. Don't know, I always had a printer attached.Type msconfig in search box, click on Services, scroll down to Print Spooler to see if it is running.https://www.thewindowsclub.com/enable-or-disable-print-spooler-serviceYou will probably need to go to Computer Management --> Services to change what it does. Type in services.msc in the search boxAnd because Windows 10 has a multitude ways to do the same thing depending on your configuration you have many more ways to screw up your computer:How to mitigate Print Spooler vulnerability on Windows 10https://www.bleepingcomputer.com/news/microsoft/how-to-mitigate-print-spooler-vulnerability-on-windows-10/How to enable or disable Print Spooler Service on Windows 10https://www.thewindowsclub.com/enable-or-disable-print-spooler-serviceThe US Government Cybersecurity & Infrastructure Security Agency has a July 2, 2021 update:PrintNightmare, Critical Windows Print Spooler Vulnerability https://us-cert.cisa.gov/ncas/current-activity/2021/06/30/printnightmare-critical-windows-print-spooler-vulnerability"CISA encourages administrators to disable the Windows Print spooler service in Domain Controllers and systems that do not print. Additionally, administrators should employ the following best practice from Microsoft’s how-to guides, published January 11, 2021: “Due to the possibility for exposure, domain controllers and Active Directory admin systems need to have the Print spooler service disabled. The recommended way to do this is using a Group Policy Object.” Or you can apply the patch.