A critical severity vulnerability affecting the Windows Print Spooler Service, dubbed “PrintNightmare”, was treated with emergency patches by Microsoft. The vulnerability, initially believed to allow for escalation of privileges, was later discovered to also allow for remote code execution (RCE) attacks. If combined successfully, the vulnerabilities could allow for complete access to an organization’s infrastructure. Obstacles to fixing the issue were compounded by the accidental public exposure by researchers of a working proof of concept (PoC) for the exploit, which was reportedly cloned before it was removed. This event highlights the crucial role organizations such as Microsoft play in rapid remediation and the importance for researchers and defenders alike to remain diligent when developing PoCs.
Most Recent Flipbooks
Main story: Rogue ex-developer leaks LockBit 3.0 builder
Main story: Uber compromised by Lapsus$'s resurgence
Main story: Cyber attacks shock the Italian energy sector
Main story: Back to school for students and ransomware groups
Main story: LastPass suffers source code data breach
Main story: LockBit under DDoS attack: Entrust strikes back?
Main Story: Cisco defies extortion attempts after network breach
Main story: Cybercriminals scramble for new hiding places after 911 proxy service folds
Main story: Free-to-use Redeemer opens doors for ransomware enthusiasts
Main story: LockBit launches new version, welcomes bug hunters
Main story: Attackers seize Microsoft zero-day for malware dissemination, espionage