Microsoft issues may or may not receive a patch. Some are configuration issues that cannot be patched. Microsoft has either not yet patched, wont patch, or are issues that need manual adjustment to fix. PrintSpoolSample abuses a functionality of the MS-RPRN (the print system remote protocol) to coerce target A to authenticate to a destination of the attackers choosing (target B) The next potential attack involves a privilege escalation from user to domain admin. Microsoft recommends that you enable Extended Protection for Authentication (EPA) or SMB signing.”]
Source: https://www.csoonline.com/article/3627403/6-vulnerabilities-microsoft-hasnt-patched-or-cant.html

