Skip to main content

Microsoft warns Windows users of another unpatched printing vulnerability

Microsoft might have patched PrintNightmare in Windows, but for the second time this month, there’s yet another printer-themed vulnerability in the wild.

Just detailed is a new vulnerability in the Windows Print Spooler service that could allow hackers to install programs; view, change, or delete data; and create new accounts on your PC.

Though that might sound scary, it is important to note that to leverage this new vulnerability, hackers will need to execute code on a victim system. Basically, it means that a hacker would need physical access to your PC. Microsoft mentions this in the support guide for the new vulnerability, going by the name of CVE-2021-34481.

It is there where Microsoft labels the vulnerability with a score of 7.8 and “important” severity, meaning it is a high-security risk. However, Microsoft does also mention that though CVE-2021-34481 was made public, it hasn’t been exploited — though another note details exploitation is “more likely.”

A printer sitting on a desk by a window.
Image used with permission by copyright holder

Microsoft hasn’t yet mentioned when a patch for this new vulnerability will be released. Instead, the company says it is investigating and “developing a security update.” Importantly, Microsoft points out that this new issue wasn’t caused by the July 2021 security update, which initially patched PrintNightmare.

Still worried? There is a temporary workaround for those who might be concerned. The workaround involves opening Powershell on Windows and determining if the Print Spooler Service is running, then stopping and disabling the service. The downside of this workaround is that stopping and disabling the Print Spooler service disables the ability to print both locally and remotely.

The last time, Microsoft was quick to release a patch for PrintNightmare. It happened within four days of Microsoft first discovering the issue. It’s unknown if a similar patch for this exploit could come at a similar time. Seeing as though the situation is a little less urgent, with hackers needing local access to a PC, it could be a while.

Microsoft credited the security researcher Jacob Baines for discovering this issue and reporting it to Microsoft. Baines notes on his Twitter page that he doesn’t believe this new vulnerability to be a variant of PrintNightmare.

Editors' Recommendations

Arif Bacchus
Arif Bacchus is a native New Yorker and a fan of all things technology. Arif works as a freelance writer at Digital Trends…
HiveNightmare is a nasty new Windows bug. Here’s how to protect yourself
Windows 11 on a tablet.

A new bug called ‘HiveNightmare’ reportedly lets anyone with local or remote access to your PC take it over. This is a fairly new and serious flaw in the latest versions of Windows 10, as well as in Windows 11, which is still being tested in the Windows Insiders program.

Using malware, the hacker can gain complete access to your PC without needing an administrative password. The bug originates from an alleged change in the recent versions of Windows 10 and 11 that grants unauthorized users the privilege to access the Security Account Manager (SAM). The SAM is a database that contains both usernames and passwords for local accounts on the operating system.

Read more
Windows 11 is finally taking the Microsoft Store seriously
Android Apps on Windows 11.

Microsoft is getting a bit more serious with the Microsoft Store in Windows 11. Now available in the newly redesigned store is the Microsoft Edge web browser marking a change from the past where the company's flagship apps weren't available in its own app store.

Although Microsoft Edge is already pre-installed in both Windows 11, there is an important milestone that Microsoft just hit with today's news. Edge is now the first official Microsoft Win32 app that you can grab on Windows 11 via the Store. Previously, all of Microsoft's apps in the store were either traditional Progressive Web Apps (PWAs) or Universal Windows Apps (UWPs.)

Read more
Researchers disclose vulnerability in Windows Hello facial recognition
Close up of Windows Hello on a PC.

Researchers at the security firm CyberArk Labs have discovered a vulnerability in Microsoft's Windows Hello facial recognition system in Windows 10 and Windows 11. Calling it a "design flaw," the researchers say that hackers can get around Windows Hello by using a certain type of hardware to eventually gain access to your PC.

Though it isn't exactly something that is easily accomplished (and Microsoft says it has mitigated the vulnerability), there's a very specific set of conditions that can lead to the bypassing. In all cases, hackers would need to capture an IR image of the victim's face, have physical access to the victim's PC, and also use a custom USB device that can impersonate a camera. CyberArk Labs describe the six-part process on its website, with a video showing the proof-of-concept.

Read more