Then start causing chaos within your networks. Any random user can escalate this privilege to become a domain admin. It’s a bug that means a domain user (once they’ve been authenticated against the remote system) can remotely run code on a Microsoft Windows system as the local SYSTEM user.Įssentially, this becomes an exploit because it means any “authenticated” user, not just the trusted, permitted admins, can add any ‘Print Driver’ to Windows. But this particular Windows Print Spooler vulnerability causes a lot of sleepless nights. When is printing not a nightmare? Admins and IT teams struggle with printers daily. In this article we’ll look at some recent high profile Windows vulnerabilities, their potential risks to your business, and how a vulnerability scanner like Intruder makes it easier to uncover them in your systems and devices. But given the extent of their software, they’re still prone to frequent flaws including their latest operating systems Windows 10 and 11. Given that 76% of the world’s desktops and 20% of the world’s servers run on Windows, this is a significant attack surface that most companies should be very conscious of.īecause of its ubiquity, Microsoft has been the number one target for hackers for some time, and they invest a lot in security. All software is prone to vulnerabilities and bugs introduced by developers that can cause security weaknesses, and Windows is no exception.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |