neowin[.]net/news/microsoft-confirms-theres-yet-another-new-windows-print-spooler-security-bug/
bleepingcomputer[.]com/news/microsoft/microsoft-confirms-another-windows-print-spooler-zero-day-bug/
Point and Print is a term that refers to the capability of allowing a user on a Windows 2000 and later client to create a connection to a remote printer without providing disks or other installation media. All necessary files and configuration information are automatically downloaded from the print server to the client.
docs.microsoft[.]com/en-us/windows-hardware/drivers/print/introduction-to-point-and-print
Originally, what we've been hearing about for the past few months, was that cybercriminals could prompt Windows to download printer drivers that included malicious files. Last Tuesday's update changed permission levels so that downloading & installing those drivers required Admin access or privilege, and Microsoft claimed the issue was now closed. However, it's been confirmed that if a printer driver was already installed, it could connect to a print server hosting malicious files and download them. Microsoft says the mitigation is to turn off the Print Spooler service, which of course turns off printing. Bleeping Computer published an alternative, enabling a setting in group policy -- *As Long As* you're not running Win10 Home, which doesn't include group policy settings.
In case all these security concerns seem overwhelming, Microsoft's global Microsoft Compromise Recovery Security Practice (CRSP) puts it somewhat bluntly:
A determined, well-resourced threat actor will, in time, breach the best cyber defenses. In summary, it’s not possible to outrun the bear, but taking the first steps to make yourself a harder target will make it much more likely that attackers will move on to easier targets.