Attackers can exploit CVE-2020-1048 with a single PowerShell command: Add-PrinterPort -Name c:\windows\system32\ualapi.dll On an unpatched system, this will install a persistent backdoor, that won't go away *even after you patch*. See https://windows-internals.com/printdemon-cve-2020-1048/ … for more details.
Wait, why did Microsoft patch an "Important" / "Exploitation Less Likely" vulnerability in Windows 7? I thought Windows 7 support ended months ago.
-
-
Extended Security Updated remain available for 3 more years.
-
*Updates
- 5 more replies
New conversation -
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.