{"id":21738,"date":"2021-07-07T11:46:17","date_gmt":"2021-07-07T15:46:17","guid":{"rendered":"https:\/\/www.thundercloud.net\/infoave\/new\/?p=21738"},"modified":"2021-07-08T10:03:53","modified_gmt":"2021-07-08T14:03:53","slug":"microsoft-issues-urgent-warning-update-your-pc-immediately","status":"publish","type":"post","link":"https:\/\/www.thundercloud.net\/infoave\/new\/microsoft-issues-urgent-warning-update-your-pc-immediately\/","title":{"rendered":"Microsoft Issues Urgent Warning: Update Your PC Immediately"},"content":{"rendered":"<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"font-size: 24pt;\"><strong><span style=\"font-family: helvetica, arial, sans-serif;\">Microsoft Issues Urgent Warning: Update Your PC Immediately<\/span><\/strong><\/span><\/p>\n<p><span style=\"font-family: helvetica, arial, sans-serif; font-size: 14pt;\">The security flaw, known as &#8220;PrintNightmare&#8221;, affects the Windows Print Spooler service in all versions of Windows.<\/span><\/p>\n<p><span style=\"font-family: helvetica, arial, sans-serif; font-size: 14pt;\">Microsoft is urging all Windows users to immediately install an update after a serious system exploit was found by researchers.<\/span><\/p>\n<p><span style=\"font-family: helvetica, arial, sans-serif; font-size: 14pt;\">The vulnerability is known as &#8220;PrintNightmare&#8221;. It affects the Windows Print Spooler service, <a href=\"https:\/\/www.cnn.com\/2021\/07\/07\/tech\/microsoft-security-update\/index.html\" target=\"_blank\" rel=\"noopener\">according to CNN<\/a>.\u00a0<\/span><\/p>\n<p><span style=\"font-family: helvetica, arial, sans-serif; font-size: 14pt;\"><a href=\"https:\/\/www.sangfor.com\/en\" target=\"_blank\" rel=\"noopener\">Sangfor Security<\/a> researchers accidentally published a &#8220;how-to&#8221; guide for exploiting the Windows Print Spooler service, thus putting the exploit into the hands of bad actors.<\/span><\/p>\n<p><span style=\"font-family: helvetica, arial, sans-serif; font-size: 14pt;\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2021-34527\" target=\"_blank\" rel=\"noopener\">Microsoft has issued out-of-band security updates<\/a> to address the exploit and rated it as critical. While the vulnerability remains unpatched, attackers can remotely execute code with system-level privileges on Windows computers.<\/span><\/p>\n<p><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">According to Microsoft&#8230;<\/span><\/p>\n<blockquote><p><span style=\"font-family: helvetica, arial, sans-serif; font-size: 14pt;\">&#8220;An attacker who successfully exploited this vulnerability could run arbitrary code with SYSTEM privileges. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights&#8230;<\/span><\/p>\n<p><span style=\"font-family: helvetica, arial, sans-serif; font-size: 14pt;\">\u201cWe recommend that you install these updates immediately,\u201d says Microsoft. \u201cThe security updates released on and after July 6, 2021, contain protections for CVE-2021-1675 and the additional remote code execution exploit in the Windows Print Spooler service known as \u2018PrintNightmare\u2019, documented in CVE-2021-34527&#8230;&#8221;<\/span><\/p><\/blockquote>\n<p><span style=\"font-family: helvetica, arial, sans-serif; font-size: 14pt;\">Because of the seriousness of the PrintNightmare exploit, Microsoft is making these critical updates available for Windows 7, Windows 8, and all supported and unsupported versions of Windows 10\u00a0<\/span><\/p>\n<p><span style=\"font-family: helvetica, arial, sans-serif; font-size: 14pt;\"><a href=\"https:\/\/us-cert.cisa.gov\/ncas\/current-activity\/2021\/06\/30\/printnightmare-critical-windows-print-spooler-vulnerability\" target=\"_blank\" rel=\"noopener\">Read more about &#8220;PrintNightmare&#8221; here<\/a>.<\/span><\/p>\n<p><span style=\"font-size: 18pt;\"><strong><span style=\"font-family: helvetica, arial, sans-serif;\">Afterword:\u00a0<\/span><\/strong><\/span><\/p>\n<p><span style=\"font-family: helvetica, arial, sans-serif; font-size: 14pt;\">Someone commented we published the wrong KB number. We published the <strong>CVE<\/strong>. CVE number is different from the KB number. The KB number for the &#8220;PrintNightmare&#8221; patch is KB5004945.\u00a0<\/span><\/p>\n<p><span style=\"font-family: helvetica, arial, sans-serif; font-size: 14pt;\">Many people were asking about download links, <a href=\"https:\/\/www.thundercloud.net\/infoave\/new\/how-to-update-your-windows-10-computer\/\" target=\"_blank\" rel=\"noopener\"><strong><span style=\"text-decoration: underline;\">please visit this page<\/span><\/strong><\/a> to see how to check for pending updates and view installed updates.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>&nbsp; &nbsp; Microsoft Issues Urgent Warning: Update Your PC Immediately The security flaw, known as &#8220;PrintNightmare&#8221;, affects the Windows Print Spooler service in all versions of Windows. Microsoft is urging all Windows users to immediately install an update after a serious system exploit was found by researchers. The vulnerability is known as &#8220;PrintNightmare&#8221;. It affects the Windows Print\u2026 <span class=\"read-more\"><a href=\"https:\/\/www.thundercloud.net\/infoave\/new\/microsoft-issues-urgent-warning-update-your-pc-immediately\/\">Read More &raquo;<\/a><\/span><\/p>\n","protected":false},"author":1,"featured_media":13950,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1674,779,10,2366],"tags":[4250],"_links":{"self":[{"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/posts\/21738"}],"collection":[{"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/comments?post=21738"}],"version-history":[{"count":5,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/posts\/21738\/revisions"}],"predecessor-version":[{"id":21748,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/posts\/21738\/revisions\/21748"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/media\/13950"}],"wp:attachment":[{"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/media?parent=21738"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/categories?post=21738"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/tags?post=21738"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}