

Previous PoCs relied on the Microsoft Print System Remote Protocol (MS-RPRN) to exploit PrintNightmare. These PoCs include scripts that can achieve local privilege escalation (LPE) on a targeted system, as well as remote code execution. At the time this blog post was published, there were at least 34 public PoC exploit scripts for PrintNightmare on GitHub. Since July 1, researchers have been diligently developing PoCs for PrintNightmare.

Research community actively developing PoC exploits for PrintNightmare The vulnerability exists because the service does not handle privileged file operations properly.Īn authenticated, remote or local attacker, could exploit this flaw in order to gain arbitrary code execution with SYSTEM privileges. The service is used to manage printers and print servers. To help clear up confusion about the vulnerability, Microsoft updated its advisory for CVE-2021-1675 to clarify that it is “similar but distinct from CVE-2021-34527.” AnalysisĬVE-2021-34527 is an RCE vulnerability in the Windows Print Spooler Service, which is available across desktop and server versions of Windows operating systems. This advisory was released in response to public reports about a proof-of-concept (PoC) exploit for CVE-2021-1675, a similar vulnerability in the Windows Print Spooler. Microsoft originally released its advisory for CVE-2021-34527 on July 1. This blog post was published on July 7 and reflects VPR at that time. * Please note: Tenable’s Vulnerability Priority Rating (VPR) scores are calculated nightly. Windows Print Spooler Remote Code Execution Vulnerability This remote code execution (RCE) vulnerability affects all versions of Microsoft Windows. On July 6, Microsoft updated its advisory to announce the availability of out-of-band (OOB) patches for a critical vulnerability in its Windows Print Spooler that researchers are calling PrintNightmare. Update July 9, 2021: The Solution section has been updated to clarify the vulnerable configurations as well as a mitigation to ensure exploitation is not feasible post-patch Background Microsoft issues an out-of-band patch for critical ‘PrintNightmare’ vulnerability following reports of in-the-wild exploitation and publication of multiple proof-of-concept exploit scripts
