For a detailed advisory, download the pdf file here.
Attackers have been targeting Windows Print Spooler services for almost 2 months now. It started with the vulnerability(CVE-2021-1675) being exploited in the wild. Soon a patch was released for the same. It was after 2 days that Microsoft found out that there exist another vulnerability which gives the attacker an access to execute a code in the victim’s system. This new vulnerability(CVE-2021-34527) has been named as PrintNightmare. An emergency patch has been released by Microsoft for some of the versions and a workflow as been made available for other versions.
<https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-1675>
<https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-34527>
<https://securelist.com/quick-look-at-cve-2021-1675-cve-2021-34527-aka-printnightmare/103123/>
<https://www.kaspersky.com/blog/printnightmare-vulnerability/40520/>