Late last week a new Windows vulnerability, dubbed PrintNightmare, was identified targeting Windows print spooler services. This 0-day exploit allows remote code execution of compromised devices, which could then be used to take over a Windows domain server if properly authenticated.
Fusion IT recommends disabling print spooler services on all servers where it is not required for printing and is proactively taking this action for our Managed Services clients. We will continue monitoring the situation and will apply appropriate patches and updates as they become available from Microsoft.
If you are on a Fusion IT Managed Services agreement, there is nothing further you need to do and there is no charge for the time being incurred to mitigate this. For our other clients, please contact us if you would like assistance with this, billed at T&M rates. It is a very quick process which does not require a server reboot.