
OPERATIONAL DEFECT DATABASE
...

...
Recent windows updates have been applied to your guest operating system.You encounter issues after the application of updates with mapping or printing.
This article highlights several historical improvements in terms of print security from the guest operating system.Future Iterations of updates may potentially introduce future printing issues. Typically these tend to be resolved promptly with a new update.
Issue: Updates KB4565349 / KB4570333 in 2020 included integrity checks on file paths interrogated by Spoolsv.exe. Due to this virtualized printers fail to install or print. Update: From Appvolumes 2012 (4.3 ), Spoolsv is automatically included in theHookInjectionWhitelist. This is documented in Appstacks are unable to print to Snagit or RightFax printers after installing windows updates (81246)Legacy Workaround: Key : HKLM\SYSTEM\CurrentControlSet\Services\svdriver\ParametersName : HookInjectionWhitelistType : REG_MULTI_SZAppend *\spoolsv.exe||* to the value Issues that can create a knock-on impact: Updates KB500802 / KB5001567 in March 2021 introduced driver-specific spooler crashes, bluescreens with APC_INDEX_MISMATCH and created specific issues for Kyocera and DYMO print devices. Rectified in an out-of-band patch (KB5001649 )Recommendations in terms of PrintNightmare "CVE-2021-34527" restrict printer installations which can have a knock-on with user-installed printers in writables.Behaviour altered with Windows Print Spooler Remote Code Execution Vulnerability CVE-2021-34481 results in administrative rights being required by default to Install Drivers (KB5005652)
Option 1: Uninstall the update temporarily and highlight the concern to the appropriate vendor. Option 2: Interrogate the issue on the file level to understand the precise impact and make a suitable adjustment utilizing third-party tools such as procmon to conduct this deep-dive.
Click on a version to see all relevant bugs
VMware Integration
Learn more about where this data comes from
Bug Scrub Advisor
Streamline upgrades with automated vendor bug scrubs
BugZero Enterprise
Wish you caught this bug sooner? Get proactive today.