PrintNightmare

Microsoft Patches PrintNightmare Exploit of Windows Printing Services

PrintNightmareLast week, a new Windows security vulnerability, called PrintNightmare, that uses printing services to gain administrative access to PCs was reported. Yesterday, Microsoft provided a patch for this vulnerability which has been deployed to University-owned computers.

PrintNightmare, if exploited, could take advantage of the Print Spooler service on most SMU-managed Windows PCs to gain admin access to the device. The Update removes the remote code execution exploit in the Windows Print Spooler service and, as an added benefit, removes the outdated Adobe Flash from the computer. Once deployed, users will be prompted by Ivanti to reboot the computer to finish the install. Please do so at your easiest convenience.

As a reminder, printing is always available using the print-by-email feature provided by PaperCut. Information on PaperCut printer locations and how to use print-by-email is available at smu.edu/printing.

If you have any questions, please contact the IT Help Desk at 214-768-HELP or help@smu.edu.

More information about PrintNightmare, Critical Windows Print Spooler Vulnerability, can be found on the Cybersecurity and Infrastructure Security Agency (CISA) website at https://us-cert.cisa.gov/ncas/current-activity/2021/06/30/printnightmare-critical-windows-print-spooler-vulnerability.

Print Friendly, PDF & Email

Published by

Ian Aberle

Ian Aberle is an Adobe Creative Educator and the Senior IT Communications Specialist & Trainer for the Office of Information Technology (OIT). For over 25 years, he has helped the SMU community use technology and implement digital and web media through multiple roles with the Digital Commons, SMU STAR Program, and now OIT. Ian enjoys photography and road trips with his family in his free time.