Emergency change: Windows Print Spooler Remote Code Execution Vulnerability
Scheduled Maintenance Report for ASPEX - Statuspage
Completed
The scheduled maintenance has been completed.
Posted Jul 08, 2021 - 03:00 CEST
In progress
Scheduled maintenance is currently in progress. We will provide updates as necessary.
Posted Jul 08, 2021 - 02:01 CEST
Scheduled
Microsoft has informed us about a critical vulnerability, affecting their operating systems.

Summary of the vulnerability: a remote code execution vulnerability exists when the Windows Print Spooler service improperly performs privileged file operations. An attacker who successfully exploited this vulnerability could run arbitrary code with SYSTEM privileges. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.

Mitigation: Microsoft has released patches to mitigate this vulnerability, except for windows 2016. We will be installing these updates tonight between 2h and 3h.
Impact of the updates: reboot of the vm.
Posted Jul 07, 2021 - 11:39 CEST
This scheduled maintenance affected: Microsoft Azure (Servers / Virtual Machines) and ASPEX Datacenter (Servers / Virtual Machines).