• Home
    • What is
    • Computer security
      • Windows security
      • Mac security
      • Linux security
    • Mobile security
      • Android security
      • iOS Security
    • Data security
    • SCCM
    • Reviews
      • Case studies
    • Advertise
    • Contact
      • Privacy Policy
  • Subscribe now

    Loading
  • Home
  • What is
  • Computer security
    • Windows security
    • Mac security
    • Linux security
  • Mobile security
    • Android security
    • iOS Security
  • Data security
  • SCCM
  • Reviews
    • Case studies
  • Advertise
  • Contact
    • Privacy Policy
Home » Breaking Computer security Cyber Security Latest Cybersecurity News Windows security

Microsoft releases emergency patch for PrintNightmare vulnerability

John Greenwood Posted On July 9, 2021
0



PrintNightmare Vulnerability

Microsoft releases an emergency fix for its printing issues that affected Zebra and Dymo printers which got affected by KB5004945, KJB5004760, and KB5003690 updates. Though Microsoft released a patch for the PrintNightmare vulnerability recently, it wasn’t completely enough as it came with a issue and after the update users  weren’t able to print with their Dynamo and Zebra label and receipt printers via their USB.

Although at first this seems like the latest patches broke the mundane printer operations, Microsoft claimed that it was actually due to the June 2021 cumulative updates.

Microsoft Rollback feature for fixing the issue

Yesterday, Microsoft released the emergency fix for PrintNightmare Vulnerability affecting the Windows 10 20H2, 2004, and 21H1 for resolving the issue with printers. The fix is being rolled out through Microsoft’s Issue Rollback (KIR) feature, and it will take around 24 hours to be reflected for the user devices and businesses. Also for businesses, this can be resolved using the Group Policy configurations.

Here are some useful links to do it using GPO,

  • How to use Group Policy for KIR configuration deployment
  • General info about how to use Group Policy

Whenever Microsoft releases Windows Cumulative Updates the problem of new issues is prevalent and they fix such issues separately or using KIR feature. The below image shows how the KIR feature works via GPO deployments,

The catch is though this is a Windows update, the KIR doesn’t show as Windows Update for users and hence users need to check their Registry to see if they have had this update for their system. Users can do that by navigating to the Registry Editor and see if the update key exits and if yes, then the update is done.

The key should look like this,

HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\FeatureManagement\Overrides\4\1861952651

If NO, then don’t panic it will take 24 hours and it will be available to your system shortly.

Share the article with your friends


Printnightmare emergency fix patchPrintNightmare Microsoft patchPrintNightmare patchPrintNightmare VulnerabilityWindows 10 KIR


Author

John Greenwood

He has been working with Cybersec and Infosec market for 12+ years now. Passionate about AI, Cybersecurity, Info security, Blockchain and Machine Learning. When he is not occupied with cybersecurity, he likes to go on bike rides!

Leave A Reply

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

  • Subscribe to our newsletter

    Loading
  • Windows security

    • Top 9 Best Log Management Tools for 2025
      September 20, 2025
    • Top 4 Remote Support Tools for 2025- Best Remote Support...
      September 18, 2025
    • Top 5 Best Unified Endpoint Management (UEM) Software...
      September 12, 2025
    • Top 5 Threat Intelligence Tools For 2025
      July 25, 2025
    • Top 5 Best Microsoft Intune Alternatives to Consider...
      July 23, 2025


  • About us

    Our vision is to deliver the trending and happening cyber events to the enthusiasts.

    We believe in delivering educational and quality content for hassle-free understanding of the subject.

  • Subscribe to our newsletter

    Loading
  • Follow us

  • Advertise with us

    You can reach us via Facebook, Linkedin, or Twitter for advertising purposes.


© The Cybersecurity Times 2022. All rights reserved.
Press enter/return to begin your search