Microsoft has issued an emergency software update to quash a security bug that’s been dubbed “PrintNightmare,”. This is a critical vulnerability affecting all versions of windows which is exploited actively.
Making sense of #PrintNightmare. A flowchart to help understand exploitation of CVE-2021-34527. Special thanks to @tiraniddo, @dez_, @gentilkiwi and @_f0rgetting_ for their test input and insights. pic.twitter.com/uqBd74xnDn— Stan Hegt (@StanHacked) July 2, 2021
Making sense of #PrintNightmare. A flowchart to help understand exploitation of CVE-2021-34527. Special thanks to @tiraniddo, @dez_, @gentilkiwi and @_f0rgetting_ for their test input and insights. pic.twitter.com/uqBd74xnDn
<p><span lang=\"EN-US\">Whenever there is a new security disclosure, it should be assumed that knowledge of how to exploit the weaknesses in the disclosure is known. It should also be understood that once information is published online that it will be cloned or copied by someone else. PoCs of exploitable security issues are commonly posted after the security disclosure and associated patches are made public. Publication is a normal process because those details might allow other security researchers to identify other paths to exploitation that might also need patching. For users, the best thing they can do to avoid falling victim is to patch their Windows systems promptly.</span></p>
Information Security Buzz (aka ISBuzz News) is an independent resource that provides the experts comments, analysis and opinion on the latest Information Security news and topics