PrintNightmare

CVE-2021-34527 (associated with CVE-2021-1675, also known as “PrintNightmare”) is a Critical Vulnerability in the Windows Print Spooler that requires immediate action.

Updates

  • 2021-07-09 – update with link to Microsoft clarification and third-party flow chart
  • 2021-07-06 – update with Microsoft announcement of patch
  • 2021-07-02 – update with new CVE and response from Microsoft. add link to third-party graphic.
  • 2021-07-01 add links for mitigation and detection. add links to technical writeup and CISA alert.

Risk: Critical
Likelihood of exploitation: High
Exploit Code: Publicly available
Exploitation in wild: Yes

Description of vulnerability: The print spooler service is vulnerable to remote code execution that leverages a compromised user account, either domain-joined or local account, to take full control of a system as the NT SYSTEM user. Proof-of-concept (PoC) code has been made publicly available for this new vulnerability leaving every Windows system at extreme risk. An adversary exploiting this vulnerability can leverage a domain-joined account, regardless of permissions, to take full control as NT SYSTEM on any domain-joined Windows system. This includes servers and Domain Controllers. An adversary exploiting this vulnerability can also leverage a local account to take full control as NT SYSTEM on any Windows system that the local account is valid. See also: official Microsoft description of vulnerability.

Remediation: See official Microsoft guidance and clarified guidance.The patch and accompanying configuration changes may not provide complete protection. We advise consulting this flow chart provided by security researcher Will Dormann. Please note that he most effective mitigation is to disable the print spooler service on all Windows devices. Information Security’s recommendation is to prioritize Domain Controllers, then critical servers, then assess where the print spooler service is needed and disable it where it is unnecessary. For everything else, which may include many workstations, you will need to weigh the risks of temporarily lost functionality against possible system compromise. Although there are many ways to disable a service on a Windows system, we have provided two easy options that any individual user can do on their own. For IT Administrators, we recommend using professional judgement on how to disable. One option for administrators is to leverage GPO to make this change.

Options for Disabling Print Spooler Service

Option 1: Disabling the print spooler Service via CMD:

Do the following:

  • Press Windows key + R to invoke the Run dialog.
  • In the Run dialog box, type cmd and then press CTRL + SHIFT + ENTER to open Command Prompt in admin/elevated mode.
  • In the command prompt window, type the commands below and hit Enter to disable and stop the Print Spooler service.
sc config "Spooler" start=disabled
sc stop "Spooler"

Option 2: Disabling the print spooler Service via Services MMC:

Do the following:

  • Press Windows key + R to invoke the Run dialog.
  • In the Run dialog box, type services.msc and hit Enter to open Services.
  • In the Services window, scroll and locate the Print Spooler service.
  • Double-click on the entry to open its properties window.
  1. In the properties window, on the General tab, move to the first section titled Startup type section and select the Disabled option from the drop-down menu in order to disable the service upon System bootup.
  2. In the properties window, on the General tab, move to the second section titled Service status section and click the Stop button in order to disable the service.
  3. Click ‘Apply’ to apply the changes.
  4. Click ‘Ok’ to finish.
Demonstration of Print Spooler Properties Dialog

Demonstration of Print Spooler Properties Dialog

Alternative mitigation options

Please note that due to the lack of official guidance from Microsoft many IT professionals are posting recommendations for mitigations. We are linking to some that originate from high quality sources for your consideration, but links do not indicate endorsement or recommendation to implement. Use your professional judgement and take reasonable precautions such as testing in non-production environments. If you do identify useful mitigations lease share your results with the University IT community.

  • https://blog.truesec.com/2021/06/30/fix-for-printnightmare-cve-2021-1675-exploit-to-keep-your-print-servers-running-while-a-patch-is-not-available/

Recommendations for Detection

More Details:

Please direct questions as appropriate to security@uchicago.edu or 773-702-2378.