The Computer Emergency Response Team Coordination Center (CERT/CC), part of the Software Engineering Institute at Carnegie Mellon University, this week reported a critical remote code execution vulnerability impacting the Windows Print Spooler service that allows a remote authenticated attacker to execute arbitrary code with system privileges on a vulnerable system. Until Microsoft fixes the PrintNightmare vulnerability, for which the exploit code is publicly available, the company advises customers to disable printing services where possible.
 
John Riggi, AHA's senior advisor for cybersecurity and risk, said, “This critical vulnerability has the potential to be highly disruptive for hospitals and health systems. Simply disabling print services in hospitals and health systems is not an option as we have already heard from multiple sources in the field. Printing services are used for everything from printing patient identification wristbands to labels for IV medications. Continuing essential patient care services must be balanced with the potential for remote exploitation of this vulnerability. We anxiously await further information and updated patches from Microsoft. The AHA has been in contact with multiple government agencies and will continue to closely monitor the situation and advise the field.”

For more on this or other cyber and risk issues, contact Riggi at jriggi@aha.org.

 

Headline
The White House issued an executive order March 6 to combat cybercrimes by threat groups. The order highlights how such groups can receive willing or…
Headline
The Administration for Strategic Preparedness and Response has released a new cybersecurity module for organizations to conduct risk assessments. The free…
Perspective
Public
As the world has learned in recent years, today’s conflicts are fought with many weapons, and cyber warfare is an integral part of the arsenal.As of this…
Headline
The FBI is reminding critical infrastructure organizations to implement mitigations from a June 2025 fact sheet on potential actions by Iranian-affiliated…
Headline
The Cybersecurity and Infrastructure Security Agency Feb. 26 released a report that updates findings from last year on RESURGE malware used to gain covert…
Headline
U.S. and international agencies Feb. 25 released guidance on protecting Cisco Software-defined Wide-area Networking systems from exploitation by malicious…