I hope by now you've learned about "PrintNightmare", one of the latest of a series of security vulnerabilities to hit Microsoft's Print Spooler service. If you have not, please take the following actions immediately:
- Put "PrintNightmare" into your favorite Internet search engine to learn what it is. This is a very serious exploitable bug that allows an attacker inside your network to elevate their permissions to that of a Domain Administrator. The attacker now "owns" your network at this point and can conduct what I'll call... mischief.
- Back up your systems and apply the latest MS Windows Server patches right away.
- Disable the Print Spooler service on every server running Hyperion / Oracle EPM.