IT Pro is supported by its audience. When you purchase through links on our site, we may earn an affiliate commission. Learn more

Security researchers uncover more Print Spooler vulnerabilities

Microsoft advises customers to disable the component entirely to prevent attacks following the PrintNightmare debacle

Researchers have discovered two more vulnerabilities in the Print Spooler component that hackers can exploit to target vulnerable Windows systems, with Microsoft now urging customers to disable the service entirely. 

This third flaw to be discovered within a matter of weeks, tracked as CVE-2021-34481 and rated 7.8 on the CVSS threat severity scale, is an elevation of privilege vulnerability that could allow an attacker to run arbitrary code with system privileges. Attackers could then install programmes as well as view, change or delete data, and create new accounts with full user rights.

Its discovery prompted Microsoft to advise customers to disable the service entirely. This is only shortly after the firm made a second attempt to patch the PrintNightmare flaw, which was, in turn, targeted by hackers after security researchers inadvertently leaked instructions on how to exploit it

PrintNightmare, for reference, was the second flaw to be discovered in Print Spooler after a first remote code execution bug was patched in June.

The service manages print jobs sent remotely to a printer on the same network by storing data in a buffer and processing the jobs either in order of receipt or by priority.

The fourth bug, which hasn’t yet been acknowledged by Microsoft, centres on the fact that the point and print feature allows non-admin users to install printer drivers.

Related Resource

X-Force Threat Intelligence Index

Top security threats and recommendations for resilience

Transparent cube against a black background - whitepaper from IBMFree download

This is a tool that makes it easier for users within a network to obtain the printer drivers and queue documents to print.

According to CERT’s Will Dormann, printers installed through this method also install queue-specific files, which can be arbitrary libraries to be loaded by the privileged Print Spooler process. 

A flaw in the process means that local privilege escalation might be possible, with security researcher Benjamin Delpy demonstrating a proof-of-concept for successful exploitation of this fourth potential vulnerability. 

The point and print feature, which is at the centre of the fourth flaw, was also the reason why Microsoft’s first attempt to patch PrintNightmare wasn’t complete. Delpy also demonstrated that exploitation was still possible on a Windows Server 2019 deployment with point and print enabled.

Featured Resources

Activation playbook: Deliver data that powers impactful, game-changing campaigns

Bringing together data and technology to drive better business outcomes

Free Download

In unpredictable times, a data strategy is key

Data processes are crucial to guide decisions and drive business growth

Free Download

Achieving resiliency with Everything-as-a-Service (XAAS)

Transforming the enterprise IT landscape

Free Download

What is contextual analytics?

Creating more customer value in HR software applications

Free Download

Recommended

Windows 11's nifty new search feature has one major downside
Microsoft Windows

Windows 11's nifty new search feature has one major downside

23 May 2022
Microsoft says it's provided over $100 million in tech support to Ukrainian government
cyber attacks

Microsoft says it's provided over $100 million in tech support to Ukrainian government

20 May 2022
Microsoft to double salary budget to retain workers
Careers & training

Microsoft to double salary budget to retain workers

17 May 2022
Microsoft warns of new botnet variant targeting Windows and Linux systems
Security

Microsoft warns of new botnet variant targeting Windows and Linux systems

16 May 2022

Most Popular

16 ways to speed up your laptop
Laptops

16 ways to speed up your laptop

13 May 2022
Preparing for the 3G sunset
Network & Internet

Preparing for the 3G sunset

18 May 2022
(ISC)2 launches free scheme to get 100,000 UK citizens into cyber security
Careers & training

(ISC)2 launches free scheme to get 100,000 UK citizens into cyber security

17 May 2022