msrc.microsoft[.]com/update-guide/vulnerability/CVE-2021-34527
windowscentral[.]com/how-mitigate-print-spooler-printnightmare-vulnerability-windows-10
zdnet[.]com/article/microsoft-adds-second-cve-for-printnightmare-remote-code-execution/
The problem centers on the way that all versions of Windows allow you to add a new printer driver -- it's possible for someone to add a printer remotely, and have Windows download what's supposed to be the driver from a remote server of their choice. Microsoft just patched a similar vulnerability, security experts then published the code to take advantage of it, and then came the discovery that the patch didn't go far enough. The security experts pulled the code they'd released, but once on the internet, always on the internet. Microsoft is actively investigating the vulnerability, so no real word yet on the potential risk for you right now. They are advising two workarounds: 1) stop & disable the print spooler service [Control Panel -> Admin Tools -> Services], which means you cannot print while it's disabled, or 2) edit the group policy setting for inbound remote printing -- the main problem there is that if you're running Win10 Home, you cannot, though if your PC/laptop is acting as a print server, with other devices accessing the printer through your system rather than directly over the network, they will be cut off also.