Security News > 2021 > July > How to mitigate Print Spooler vulnerability on Windows 10

Yesterday, Microsoft released multiple Windows updates to fix the widely reported "PrintNightmare" vulnerability in the Windows Print Spooler service.
According to Microsoft, this vulnerability is impacting all Windows 10 versions, including the most recent May 2021 Update and version 20H2. To deploy Microsoft's patch, you need to check for updates under Updates & Security > Windows Update and apply the latest July update, and reboot the system when prompted.
Thankfully, you can temporarily disable the Windows Print Spooler service to mitigate the vulnerability until a proper fix is released.
In this guide, we will highlight the steps to disable the Windows Print Spooler service and mitigate the PrintNightmare CVE-2021-34527 vulnerability.
Enter the following command to stop the Spooler service:Stop-Service -Name Spooler -Force.
Enter the following command to enable the Spooler service:Set-Service -Name Spooler -StartupType Automatic.
News URL
Related news
- Windows 10 users urged to upgrade to avoid "security fiasco" (source)
- Microsoft to force install new Outlook on Windows 10 PCs in February (source)
- Windows 10 KB5049981 update released with new BYOVD blocklist (source)
- Microsoft ends support for Office apps on Windows 10 in October (source)
- Windows 11 24H2 now also offered to all eligible Windows 10 PCs (source)
- January Windows 10 preview update force installs new Outlook (source)
- Windows 10 KB5051974 update force installs new Microsoft Outlook app (source)
Related Vulnerability
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2021-07-02 | CVE-2021-34527 | Improper Privilege Management vulnerability in Microsoft products <p>A remote code execution vulnerability exists when the Windows Print Spooler service improperly performs privileged file operations. | 0.0 |