Workstation Vulnerability Dashboard

Google Chrome

27

The version of Google Chrome installed on the remote Windows host is prior to 98.0.4758.80. It is, therefore, affected by multiple vulnerabilities as referenced in the 2022_02_stable-channel-update-for-desktop advisory.

Upgrade to Google Chrome version 98.0.4758.80 or later.

Microsoft XML Parser

2

The remote host contains one or more unsupported versions of the Microsoft XML Parser (MSXML) or XML Core Services.

Lack of support implies that no new security patches for the product will be released by the vendor. As a result, it is likely to contain security vulnerabilties.

Note that support for MSXML 3.0 and 6.0 is based on the support policy of the operating system on which it is installed. Support for MSXML 5.0 is based on the Microsoft Office lifecycle policy. Upgrade the software packages responsible for the unsupported DLL versions or upgrade to a supported version of Windows (Visa / 2008 or later). Alternatively, uninstall the outdated MSXML or XML Core Services.

Upgrade the software packages responsible for the unsupported versions. Alternatively, uninstall the outdated MSXML or XML Core Services.

February 2022 Windows 10 cumulative update

1 1

The remote Windows host is missing security update 5010342. It is, therefore, affected by multiple vulnerabilities.

Apply Cumulative Update 5010342.

PrintNightmare

126

A remote command execution vulnerability exists in Windows Print Spooler service which improperly performs privileged file operations. An authenticated, remote attacker can exploit this to bypass and run arbitrary code with SYSTEM privileges. The remote system is not fully secure as the point and print registry settings contain an insecure configuration in one of the following locations/keys:

  • HKLM\Software\Policies\Microsoft\Windows NT\Printers\PointAndPrint
  • HKLM\Software\Policies\Microsoft\Windows NT\Printers\PointAndPrint\NoWarningNoElevationOnInstall
  • HKLM\Software\Policies\Microsoft\Windows NT\Printers\PointAndPrint\UpdatePromptSettings
  • HKLM\Software\Policies\Microsoft\Windows NT\Printers\PointAndPrint\RestrictDriverInstallationToAdministrators

See Vendor Advisory.