Windows Print Spooler Security Vulnerability

Revision as of 20:11, 6 July 2021 by Steve410 (talk | contribs) (Created page with "On 7/6/21, we were informed of a serious vulnerability in Windows's print spooler that would allow someone on your network (e.g., someone on the same VPN as you) to gain acces...")
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

On 7/6/21, we were informed of a serious vulnerability in Windows's print spooler that would allow someone on your network (e.g., someone on the same VPN as you) to gain access to your Windows PC/laptop... if the Print Spooler is configured to accept client connections. By default, it seems, it is. So, you have to disable that option right away, until Microsoft comes up with a patch.

  • In your Windows search window, bottom left, type Edit Group Policy.
  • Click on Edit Group Policy. If your system needs it, you will be prompted for your admin account credentials. This will bring up the Local Group Policy Editor.
  • Click on the down arrow to the left of Computer Configuration on the left-hand pane. This will provide a drop-down of choices.
  • Click on the down arrow to the left of Administrative Templates
  • Click on Printers.
  • Over on the right-hand pane, Double-click on Allow Print Spooler to accept client connections. (You might need to scroll towards the bottom to find it.) This brings up the the Allow Print Spooler to accept client connections. window.
  • Click on Disabled, and hit OK. (If it was already set to Disabled, you're already done, just hit Cancel, and you may continue working on your syste,)
  • Exit out of the Local Group Policy Editor
  • Reboot your system for this change to Disabled to take effect.