Free micropatches addressing the actively exploited PrintNightmare zero-day vulnerability in the Windows Print Spooler service are now available through the 0patch platform. The buggy code behind this remote code execution bug (tracked as CVE-2021-34527) is present in all versions of Windows, with Microsoft still investigating if the vulnerability can be exploited exploitable on all of them. Microsoft has shared mitigation measures to block attackers from compromising vulnerable systems and is working on a fix. The company’s advice takes into consideration the fact that this service is enabled by default on most Windows clients and server platforms.
Source: https://www.bleepingcomputer.com/news/security/actively-exploited-printnightmare-zero-day-gets-unofficial-patch/

