Microsoft acknowledges network printing issues in this month's Patch Tuesday updates

| |

Microsoft released the September Patch Tuesday updates last week to address the “PrintNightmare” remote code execution vulnerability affecting all versions of Windows, but it looks like these updates come with their own set of issues. The company has acknowledged that this month’s security update breaks network printing by repeatedly requiring admin credentials (via Bleeping Computer).

For those unfamiliar, the PrintNightmare flaw is a remote code execution vulnerability in the Windows Print Spooler service that has been making headlines since July. Since Microsoft rolled out the September Patch Tuesday patches, several users have complained that an update has been found to cause problems with network printers.

“After installing KB5005033 or a later update, certain printers in some environments using Point and Print might receive a prompt saying, "Do you trust this printer" and requiring administrator credentials to install every time an app attempts to print to a print server or a print client connects to a print server, “ Microsoft acknowledged in its Security Advisory. The problem affects numerous client and server versions of Windows, and the full list of known systems is available on this support page.

The company says the issue explicitly impacts all types of network printers, including models manufactured by Canon, HP, and Konica Minolta, though some label printers are also affected. However, this issue doesn’t appear to be causing problems with printers that use a USB connector cable to attach to PCs.

Microsoft recommends installing the latest drivers as soon as possible and ensuring that both client and server sides are running the same print driver version. However, if this workaround doesn’t resolve the problem, customers should contact the printer manufacturer to resolve this problem.

Share This Post:

Previous

A quick guide to Windows 11 accessibility

Halo Infinite multiplayer technical preview email invites are now being sent to players

Next