Action Requested: Critical Windows Print Spooler Vulnerability | Information Technology | University of Pittsburgh

You are here

Action Requested: Critical Windows Print Spooler Vulnerability

Friday, July 2, 2021 - 19:08


Pitt Information Technology has updated guidance regarding the recent announcement by Microsoft of a Windows Print Spooler Remote Code Execution Vulnerability. This is a critical flaw as it allows for remote code execution and can allow an attacker complete control over a vulnerable system. The Windows Print Spooler Service is enabled by default on Windows PCs and servers.

Pitt IT recommends that users immediately disable the Windows Print Spooler service on any server that does not require function as a print server—even if it has been patched previously. Additionally, if you have not already done so, please identify and install the security updates necessary to remediate these vulnerabilities by using Microsoft's Windows Update feature on their computers as soon as possible.

In addition, Pitt IT recommends that all students, faculty, and staff install Antivirus and Anti-Malware (Malwarebytes) Protection. Departments can submit a help request to obtain Malwarebytes for multiple machines.

Please contact the 24/7 IT Help Desk at 412-624-HELP (4357) if you have any questions regarding this announcement.