SimplerCloud Pte Ltd

×
×

News: Security Advisory: Windows Print Spooler Remote Code Execution Vulnerability

Published: 08/07/2021 Back

This advisory is provided as a courtesy.

We would like to bring to your attention a newly discovered critical vulnerability affecting all versions of Windows for clients and servers, including Windows Server 2019, 2016, 2012 R2, 2012, 2008, as well as Windows 10, 8, and 7.


The remote code execution vulnerability exists due to improper file operations performed by the Windows Print Spooler service, allowing an attacker to exploit this vulnerability by running arbitrary code with SYSTEM privileges. This provides an avenue for the attacker to install programs to view, change, or delete data; or create new accounts with full user rights.


As of Thursday, 8 July 2021 at 1:50 pm, Microsoft has released patches for the vulnerability for certain operating systems such as Windows Server 2019, 2012 R2, while patches for other operating systems such as Windows Server 2016 are still in progress.


Affected Software


All versions of Microsoft Windows operating system for both clients and servers, which include but not limited to:


Windows Server 2019
Windows Server 2016
Windows Server 2012 R2
Windows Server 2012
Windows Server 2008
Windows 10
Windows 8
Windows 7


How to Fix the Problem


1. Install the latest patches from Windows Update.


2. For certain operating systems which patches are not yet available, the workaround is to modify the registry settings of the systems as follows:


HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows NT\Printers\PointAndPrint
NoWarningNoElevationOnInstall = 0 (DWORD) or not defined (default setting)
NoWarningNoElevationOnUpdate = 0 (DWORD) or not defined (default setting)


More information


Critical flaws in Windows Print spooler service could allow for remote attacks
CVE-2021-34527: Microsoft Releases Out-of-Band Patch for PrintNightmare Vulnerability in Windows Print Spooler
Microsoft issues emergency Windows patch to fix critical ‘PrintNightmare’ vulnerability
Windows Print Spooler Remote Code Execution Vulnerability

Request Assistance

If you would like to engage our assistance to perform the necessary patches installation and/or workaround to fix the vulnerability, we can do it for you at a one-time discounted fee of $30. Please submit your order at Order -> Additional Services -> Vulnerability Fix - WINDOWS: HTTP.sys; Schannel; Freak Attack, WannaCry, Petya (Win), VMWare vCenter Server - $30

Or please first open a support ticket and provide us with the access details to your Windows servelet or server with us.

Thank you