Microsoft warns of PrintNightmare vulnerability due to flaw in Windows Print Spooler

Credit: Pixabay/CC0 Public Domain

by Bob Yirka , Tech Xplore

Microsoft and multiple other entities are warning users and entity operators of a vulnerability in Windows Print Spooler that can allow criminals to hack into Windows computers and remotely execute code. In its post on the company’s Security Update Guide, Microsoft labels the vulnerability as CVE-2021-34527, noting that it is aware of the vulnerability and is working on a patch.

The flaw in Print Spooler involves two vulnerabilities. The first is local privilege escalation, which means that a nefarious character accessing a compromised computer with only a low degree of privilege can give themselves admin or system level rights to the machine. The second allows for , which can very obviously be weaponized by criminals—it allows for both local access and  into other systems such as a domain controller.

The vulnerability is described as zero-day, because it gives computer operators no opportunity for detection and thus no time to respond. The mix-up in making the vulnerability public by security firm Sangfor apparently came about due to a prior patch released by Microsoft to fix a related vulnerability in Print Spooler. The company had planned to document the  at this year’s Black Hat conference and thus had made its findings public for attendees. In its warning, Microsoft noted that  are currently being exploited.

It is not clear when Microsoft will issue a patch, but they suggest users, or more likely IT administrators, disable the Print Spooler until the patch is issued. Users or managers also have the option of disabling remote printing via the Group Policy option.