Microsoft now releasing an emergency update to fix Win7/8/8.1/10 zero-day vulnerabilities

Microsoft issued a warning to all Windows users last week, saying that its Windows spooler has an unpatched serious bug. This vulnerability is called PrintNightmare and is being widely exploited. This vulnerability is being maliciously exploited by some malicious attackers. They can use this to achieve local privileges and remote code execution, and may even remotely install programs on your PC, modify data, or create an account with the highest administrator privileges. The degree of danger is full.

After the working day came, Microsoft developers began to work hard to repair it. Microsoft today pushed the KB5004945 emergency update to Win10 users. The other version codes are as follows:

  • Version 21H1, 20H1, 2004-KB5004945.
  • Version 1909-KB5004946.
  • Version 1809 and Windows Server 2019-KB5004947.
  • Version 1803-KB5004949.
  • Version 1507-KB5004950.
  • Windows 8.1 and Windows Server 2012 – KB5004954 and KB5004958 (security patches only).
  • Windows 7 SP1 and Windows Server 2008 R2 SP1 – KB5004953 and KB5004951 (security only)
  • Windows Server 2008 SP2-KB5004955 and KB5004959 (security only).
  • Windows 10 KB5004945 download direct link: 64-bit and 32-bit (x86).

Join Our RealMi Central Channel On Telegram

It is recommended that you update as soon as possible, and the system’s internal version number will be upgraded to 19043.1083 (19042.1083 or 19041.1083) after installation. If you decide that you must skip today’s update, you can still receive the same push in the next week’s Tuesday update (July 13).

For the remaining supported Windows versions, Microsoft plans to release emergency patches in the next few days. If you are really worried, you can refer to the following steps (disable the Windows Print Spooler service):

  • Open Windows search.
  • Enter PowerShell and run it as “Administrator”.
  • Enter the following command:
  • Stop – Service – Name Spooler – Force
  • Press the Enter key.
  • Enter the following command:
  • Set – Service – Name Spooler – StartupType Disabled
  • Press the Enter key.

After you successfully run the above two commands, Windows can disable the Print Spooler service. Of course, we still recommend that you update, after all, some metaphysical problems will occasionally occur after disabling system services.

It is worth mentioning that the vulnerability of the Windows spooler service has always been one of the most troublesome problems for system administrators. For example, the most notorious example in history is the Stuxnet virus.

More than ten years ago, Stuxnet used multiple zero-day vulnerabilities (including the Windows Print Spooler vulnerabilities) to destroy 60% of Iran’s computers and used them to destroy its industrial infrastructure and strike nuclear facilities, almost alone. Security cyber warfare and a new type of arms race.

If you like our news and you want to see such news even further, then follow RealMi Central on Google News, Telegram (RealMi Central, Xiaomi, Apple, Realme, Samsung, Microsoft, OnePlus, Huawei/Honor, Android 12), Twitter, Facebook (Page) (Group) & Instagram.

Leave a Comment