yitit
Home
/
Software
/
Emergency OOB Update Is Out to Address “PrintNightmare” Bug – Affects ALL Windows Editions
Emergency OOB Update Is Out to Address “PrintNightmare” Bug – Affects ALL Windows Editions-February 2024
Feb 21, 2026 9:30 PM

Microsoft acknowledged a remote code execution vulnerabilitythat affects Windows Print Spooler last week. Tracked as CVE-2021-34527, the PrintNightmarezero-day impacts all versions of Windows 10 along with older Windows operating systems, pushing the company to deliver an out-of-band update to fix this security issue.

Windows update KB5004945is now available for all the supported versions, including version 21H1, version 20H1, v2004, v1909, v1809, v1803, v1507. This fix is also available for older operating systems, includingWindows 8.1, Windows Server 2012,Windows 7 SP1, Windows Server 2008 R2 SP1, andWindows Server 2008 SP2. The company added that it will deliver updates for the "remaining affected supported versions of Windows" in the coming days.

Microsoft is advising users to check for updates and get this emergency update at the earliest to protect their devices against remote attacks.

Currently available updates include (release notes might take some time to be uploaded):

Windows 10 v21H1 (KB5004945)Windows 10 v20H2 (KB5004945)Windows 10 v2004 (KB5004945)Windows 10, version 1909 (KB5004946)Windows 10 v1809 and Windows Server 2019 (KB5004947)Windows 10 v1803 (KB5004949)Windows 10 v1507 (KB5004950)Windows 8.1 and Windows Server 2012 (Monthly RollupKB5004954/ Security onlyKB5004958)Windows 7 SP1 and Windows Server 2008 R2 SP1 (Monthly RollupKB5004953/ Security onlyKB5004951)Windows Server 2008 SP2 (Monthly RollupKB5004955/ Security onlyKB5004959)

Remote code execution "PrintNightmare" zero-day bug that affects all Windows

Exploiting this Windows RCE flaw, an attacker couldrun code on the affected device with full system privileges, install software, and modify data. Microsoft explains:

A remote code execution vulnerability exists when the Windows Print Spooler service improperly performs privileged file operations. An attacker who successfully exploited this vulnerability could run arbitrary code with SYSTEM privileges. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.

The issue is so severe thatthe CERT Coordination Center (CERT/CC) and the US government had to step in to offer mitigation for this critical RCE vulnerability. The Cybersecurity and Infrastructure Security Agency (CISA) had encouragedadmins to disable the Windows Print Spooler serviceon servers that aren't being used for printing.

Admins are strongly advised to check the details over at this official security bulletinif for some reason updates can't be installed and a workaround is needed.

- Blockbuster offer! Surface Duo now available at an unbelievable price of $409.99!

Comments
Welcome to yitit comments! Please keep conversations courteous and on-topic. To fosterproductive and respectful conversations, you may see comments from our Community Managers.
Sign up to post
Sort by
Login to display more comments
Software
Recent News
Copyright 2023-2026 - www.yitit.com All Rights Reserved