Categories: Cyber Security News

New Unpatched Windows Print Spooler Bug Let Hackers Exploit The Elevation of Privilege

Microsoft issued a new security warning about the unpatched Windows Print Spooler Elevation of privilege vulnerability that allows attackers to execute an arbitrary code with the system privileges’.

“The print spooler service is a service that is running on each computer that participates in the Print Services system. The print spooler service implements the print client and print server roles, by enabling each participating system to act as a print client, administrative client, or print server for the Print Services system.”

The Vulnerability found existing in the Print Spooler service allows attackers to perform a local elevation of privilege.

Once the attackers successfully exploited this vulnerability, they could install the malicious programs, modify, change and delete the data, which also allows attackers to create new user accounts.

In order to exploit the vulnerability, an attacker needs to execute the code on a victim system, and it is a local privilege escalation vulnerability and tracked as CVE-2021-34481.

According to Microsoft report “An elevation of privilege vulnerability exists when the Windows Print Spooler service improperly performs privileged file operations. An attacker who successfully exploited this vulnerability could run arbitrary code with SYSTEM privileges. “

Mitigation:-

Microsoft published a work around for this vulnerability to secure the system from this vulnerability.

“We will update this CVE when we complete our investigation. If you wish to be notified when updates are released, we recommend that you register for the security notifications mailer to be alerted of content changes to this advisory. See Microsoft Technical Security Notifications.” Microsoft said.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity and hacking news updates.

Balaji N

BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Recent Posts

Assessing Third-Party Vendor Risks – CISO Best Practices

Third-party vendors are indispensable to modern enterprises, offering specialized services, cost efficiencies, and scalability. However,…

55 minutes ago

FastCGI Library Vulnerability Exposes Embedded Devices to Code Execution Attacks

A critical vulnerability in the FastCGI library could allow attackers to execute arbitrary code on…

56 minutes ago

React Router Vulnerabilities Let Attackers Spoof Contents & Modify Values

Significant security flaws have been discovered in React Router, a widely-used routing library for React…

1 hour ago

Selecting Cybersecurity Vendors – CISO’s Decision Framework

In an era where cyber threats are growing in sophistication and frequency, Chief Information Security…

1 hour ago

CISA Warns Planet Technology Network Products Let Attackers Manipulate Devices

The Cybersecurity and Infrastructure Security Agency (CISA) has issued a critical advisory warning of multiple…

2 hours ago

Hackers Selling Advanced Stealthy HiddenMiner Malware on Dark Web Forums

A new threat actor is offering an enhanced version of HiddenMiner, a sophisticated cryptomining malware…

2 hours ago