Microsoft’s Windows 10 Print Spooler security is turning into a headache for the company and its 10 customers.
Branded bugs like Heatbleed from 2014 are a bit passé but the Windows 10 PrintNightmare bugs appear to be an apt choice: Microsoft released fixes in July and August and, just after its August 10 Patch Tuesday change to the Print Spooler service, it’s disclosed yet another print spooler bug.
This one concerns a Windows Print Spooler remote code execution vulnerability, tagged as CVE-2021-36958.
“A remote code execution vulnerability exists when the Windows Print Spooler service improperly performs privileged file operations. An attacker who successfully exploited this vulnerability could run arbitrary code with SYSTEM privileges. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. The workaround for this vulnerability is stopping and disabling the Print Spooler service,” Microsoft’s advisory said.
The previously disclosed bug CVE-2021-34481 in the Windows Print Spooler service allows a local attacker to escalate privileges to the level of ‘system’, letting the attacker install malware and create new accounts on Windows 10 machines.
To mitigate potential threats, Microsoft this week released an update that changes default behavior for Point and Print features in Windows which will prevent an average user from adding or updating printers. After installation, Windows 10 requires admin privileges to install these driver changes.
While it will cause extra work for admins, Microsoft says it “strongly” believes that the security risk justifies this change.
Admins have an option to disable Microsoft’s mitigation, but emphasized that it “will expose your environment to the publicly known vulnerabilities in the Windows Print Spooler service.”
The issues affecting the Print Spooler service have escalated over the summer as a result of researchers finding different avenues to attack the set of flaws.
CVE-2021-36958 and another PrintNightmare bug, tracked as CVE-2021-34483, were reported to Microsoft by an Accenture security researcher, Victor Mata, who says he reported the issues in December. Other related Print Spooler bugs include CVE-2021-1675 and CVE-2021-34527.
Will Dormann, a vulnerability analyst at the CERT/CC, pointed out the apparently incomplete fixes in the August 2021 Patch Tuesday updates.
As he notes, security researcher Benjamin Delpy released a proof of concept for one of the PrintNightmare bugs in July. Dormann informed Microsoft that Delpy’s PoC still worked on August 11, a day after August’s Patch Tuesday. Delpy’s proof of concept is what prompted Microsoft’s latest disclosure about CVE-2021-36958, according to Dormann.
“Microsoft did fix *something* related to your attack in their update for CVE-2021-36936, which describes nothing about what it fixes. For example, my PoC for VU#131152 now prompts for admin creds. However, @gentilkiwi‘s PoC still works fine. Time for MS to issue a new CVE?,” wrote Dormann.
- Kaseya ransomware attack: What you need to know
- Surfshark VPN review: It’s cheap, but is it good?
- The best browsers for privacy
- Cyber security 101: Protect your privacy
- The best antivirus software and apps
- The best VPNs for business and home use
- The best security keys for 2FA
- How victims who pay the ransom encourage more attacks (ZDNet YouTube)