Windows “PrintNightmare” Patch Requires Additional Registry Settings to Be Fully Secure
https://wccftech.com/windows-printnightmare-patch-requires-additional-registry-settings/
Last week, Microsoft had to release an emergency update to patch the "PrintNightmare" security flaw that was enabling attackers to gain full system privileges. It was, however, later reported that even after installing the update carrying this patch, PCs were still vulnerable to the attack.
Addresses a remote code execution exploit in the Windows Print Spooler service, known as “PrintNightmare”, as documented in CVE-2021-34527. After installing this and later Windows updates, users who are not administrators can only install signed print drivers to a print server. By default, administrators can install signed and unsigned printer drivers to a print server. The installed root certificates in the system’s Trusted Root Certification Authorities trusts signed drivers. Microsoft recommends that you immediately install this update on all supported Windows client and server operating system, starting with devices that currently host the print server role. You also have the option to configure the RestrictDriverInstallationToAdministrators registry setting to prevent non-administrators from installing signed printer drivers on a print server.