Skip to content

TechDirectArchive

Hands-on IT, Cloud, Security & DevOps Insights

  • Home
  • About
  • Advertise With US
  • Contact
  • Reviews
  • Toggle search form
Home » Security | Vulnerability Scans and Assessment » Mitigating ‘PrintNightmare’ Vulnerability: Print Spooler Solutions
  • Error during connect in the default daemon configuration on Windows
    Preparation failed: The docker client must be run with elevated privileges Version Control System
  • MBAM
    The web application “Administration Portal” cannot be enabled because one or more software dependencies are not met Windows
  • Remove Bing Chat Button from Edge Sidebar
    How to Remove Bing Chat Button from Edge Sidebar Windows
  • schedulepythontasksinWindows
    Task Scheduler shows task still running despite successful Windows
  • how to bypass windows admin log in password 2
    Disable or Enable Auto log on in Windows Windows
  • windows hello la gi
    All you need to know before deploying Windows Hello for Business Key and Certificate Trust Windows
  • Database Collation
    Change SQL Database Collation: ePO events DB and SQL server should match with ePO core collation Oracle/MSSQL/MySQL
  • PowerShell 1
    How to upgrade PowerShell to the latest version on macOS via Homebrew Mac

Mitigating ‘PrintNightmare’ Vulnerability: Print Spooler Solutions

Posted on 02/07/202110/09/2023 Christian By Christian No Comments on Mitigating ‘PrintNightmare’ Vulnerability: Print Spooler Solutions
PrintNightmare Vulnerability

PrintNightmare is the most recent zero-day vulnerability impacting the Windows print spooler, and the vulnerability can enable an attacker to remotely control an affected system. The service that allows the spooling of documents in print has become a recurring nightmare for Microsoft. This flaw was found as indicated “CVE-2021-1675 “and classified as low risk since it only allows attacks based on escalation of privileges conducted locally with human input. Microsoft issued a patch for CVE-2021-1675, described as a “Windows Print Spooler Elevation of Privilege Vulnerability” last Tuesday (Patch Tuesday).

The acknowledgment comes after researchers from Hong Kong-based cybersecurity company Sangfor published a technical deep-dive of a Print Spooler RCE flaw to GitHub, along with a fully working PoC code, before it was taken down just hours after it went up. For other articles I have written on GPO, see the following link. See this guide if you ever wanted to know what group policies are enabled or analyze GPO computers, and how to fix Print Spooler Service not running. Kindly refer to the fix (patch) to remediate the PrintNightmare “Out-of-Band Security Update for PrintNightmare: Patch released for Windows Print Spooler Remote Code Execution Vulnerability“.

Security researchers recently leaked details of a critical Windows print spooler vulnerability referred to as the "PrintNightmare". The flaw is a Stuxnet-style zero-day and can be exploited to completely compromise a Windows system. As explained by Bleeping Computer, researchers from Chinese security firm QiAnXin published a video showing that they had been able to achieve privilege escalation and remote code execution with the vulnerability. Then researchers from Sangfor, another Chinese security firm got a little mixed up and published a technical write up of what they thought was the same bug, calling it PrintNightmare. 

- July 7th, 2021, the PrintNightmare security update for Windows Server 2012, 2016, and Windows 10, v1607 was released. But why are the Out-of-Band patches not effective for the Print Spooler vulnerability?

Recently, we found right approaches to exploit #CVE-2021-1675 successfully, both #LPE and #RCE. It is interesting that the vulnerability was classified into #LPE only by Microsoft, however, it was changed into Remote Code Execution recently.https://t.co/PQO3B12hoE pic.twitter.com/kbYknK9fBw

— RedDrip Team (@RedDrip7) June 28, 2021

Print Spooler Service Disabling

System administrators are being advised to disable the Windows print spool service on domain controllers Windows servers running as domain controllers from where attackers can pivot to entire internal networks. Although the problem affects non-domain systems and it is currently not known when the PrintNightmare will be patched. To do this, we will first determine if the Print Spooler service is running by running the following command:Get-Service -Name Spooler. You can also check this via services.msc as shown below.

Security Solutions
Screenshot 2021 07 02 at 22.55.55
Print Spooler
Screenshot 2021 07 02 at 22.58.49

If the Print Spooler is running or if the service is not set to disabled, select one of the following options to either disable the Print Spooler service, or to Disable inbound remote printing through Group Policy:

Option 1: Disable the Print Spooler service: If disabling the Print Spooler service is appropriate for your enterprise, use the following PowerShell commands. Just ensure you run each command one after the other on the Domain Controller (DC).

Stop-Service -Name Spooler -Force
Set-Service -Name Spooler -StartupType Disabled
Security Solutions
Screenshot 2021 07 02 at 23.05.59
PrintNightmare Vulnerability
Screenshot 2021 07 02 at 23.06.33

Alternatively, you could also disable this on the fly via the Windows Services as shown below..

Mitigation

If you wish to start this in the future, kindly launch Windows Services and right click on the Print Spooler service and select properties.
– Select a startup type and click on start as shown below.

Screenshot-2021-07-02-at-23.08.52

Option 2 – Disable inbound remote printing through Group Policy:

You can also configure the settings via Group Policy as shown below. Disable the “Allow Print Spooler to accept client connections:” policy to block remote attacks. You may want to see this guide before proceeding: What is GPO and how can it be launched in Windows.

Computer Configuration / Administrative Templates / Printers

To launch the local group Policy console, open the run dialog box, search for “gpedit.msc” or from Windows Search as shown below

Screenshot-2021-07-02-at-23.21.12

Each of the methods above will launch the “Local Group Policy Console” as shown below. Navigate through “Computer Configuration / Administrative Templates / Printers”.
– To disable this in the future, kindly follow the same steps and select “Not Configured”.

Screenshot-2021-07-02-at-23.25.43
Screenshot 2021 07 02 at 23.25.43
Screenshot-2021-07-02-at-23.26.24
Screenshot-2021-07-02-at-23.26.45

If you wish the policy to take effect immediately without waiting for the default settings, please run any of the following commands discussed in this hyperlink: GPUpdate and GPUpdate /force. Group policy on Windows 10 periodically refreshes the Registry at certain intervals to keep the Registry values in check at all times which is an interval of 90 minutes.

Corresponding keyphrase: “Domain-wide Group Policy deployment

You may want to roll this setting domain-wide to your internal systems. Furthermore, To launch Group Policy from the Domain controller,
– Launch the Server Manager. (Note: you can also use the Windows Administrative Tools for this).
– Under Tool,
– Search for Group Policy Management. This will open up the Group Policy Management Console. You can also use the “Advanced Group Policy Management (AGPM)”.

Screenshot-2021-07-02-at-23.31.56

Create a new group policy object and follow the same steps by navigating through “Computer Configuration / Administrative Templates / Printers” and have it disabled.
– When you are done, you can either apply it to the domain or an OU as you wish. In addition, If you wish to see how similar settings are configured from start to finish, please see “how to update central store for Group Policy Administrative Templates”.

Screenshot-2021-07-02-at-23.34.35

Impact of workaround: This policy will block the remote attack vector by preventing inbound remote printing operations. However, The system will no longer function as a print server, but local printing to a directly attached device will still be possible.

I hope you found this blog post helpful. Moreover, If you have any questions, please let me know in the comment session.

Rate this post

Thank you for reading this post. Kindly share it with others.

  • Click to share on X (Opens in new window) X
  • Click to share on Reddit (Opens in new window) Reddit
  • Click to share on LinkedIn (Opens in new window) LinkedIn
  • Click to share on Facebook (Opens in new window) Facebook
  • Click to share on Pinterest (Opens in new window) Pinterest
  • Click to share on Tumblr (Opens in new window) Tumblr
  • Click to share on Telegram (Opens in new window) Telegram
  • Click to share on WhatsApp (Opens in new window) WhatsApp
  • Click to share on Pocket (Opens in new window) Pocket
  • Click to share on Mastodon (Opens in new window) Mastodon
  • Click to share on Bluesky (Opens in new window) Bluesky
  • Click to share on Threads (Opens in new window) Threads
  • Click to share on Nextdoor (Opens in new window) Nextdoor
Security | Vulnerability Scans and Assessment

Post navigation

Previous Post: Windows 11 Hardware and Software Requirements: Upgrade to Windows 11
Next Post: Measured Boot, Secure Boot, Trusted Boot, and Early Launch Anti-Malware: How to secure the Windows 10 boot process

Related Posts

  • Synology 1
    Synology NAS brute-force attack: Employ Synology Best Practice to remediate StealthWorker Botnet attack Security | Vulnerability Scans and Assessment
  • Turn On Or Off Auto Unlock For BitLocker Drive
    How To Turn On Or Off Auto-Unlock For BitLocker Drive In Windows 10/11 Security | Vulnerability Scans and Assessment
  • encrypt your Data with Trellix Data Encryption
    How to encrypt your system with Trellix Data Encryption Security | Vulnerability Scans and Assessment
  • microsoft ntlm2
    NT LAN Manager: How to prevent NTLM credentials from being sent to remote servers Security | Vulnerability Scans and Assessment
  • Microsoft Defender
    Attack Surface Reduction Configuration with Microsoft Defender Scripts
  • Change BitLocker Password in Windows
    How to Change BitLocker Password in Windows Security | Vulnerability Scans and Assessment

More Related Articles

Synology 1 Synology NAS brute-force attack: Employ Synology Best Practice to remediate StealthWorker Botnet attack Security | Vulnerability Scans and Assessment
Turn On Or Off Auto Unlock For BitLocker Drive How To Turn On Or Off Auto-Unlock For BitLocker Drive In Windows 10/11 Security | Vulnerability Scans and Assessment
encrypt your Data with Trellix Data Encryption How to encrypt your system with Trellix Data Encryption Security | Vulnerability Scans and Assessment
microsoft ntlm2 NT LAN Manager: How to prevent NTLM credentials from being sent to remote servers Security | Vulnerability Scans and Assessment
Microsoft Defender Attack Surface Reduction Configuration with Microsoft Defender Scripts
Change BitLocker Password in Windows How to Change BitLocker Password in Windows Security | Vulnerability Scans and Assessment

Leave a Reply Cancel reply

You must be logged in to post a comment.

Microsoft MVP

VEEAMLEGEND

vexpert-badge-stars-5

Virtual Background

GoogleNews

Categories

veeaam100

sysadmin top30a

  • Error during connect in the default daemon configuration on Windows
    Preparation failed: The docker client must be run with elevated privileges Version Control System
  • MBAM
    The web application “Administration Portal” cannot be enabled because one or more software dependencies are not met Windows
  • Remove Bing Chat Button from Edge Sidebar
    How to Remove Bing Chat Button from Edge Sidebar Windows
  • schedulepythontasksinWindows
    Task Scheduler shows task still running despite successful Windows
  • how to bypass windows admin log in password 2
    Disable or Enable Auto log on in Windows Windows
  • windows hello la gi
    All you need to know before deploying Windows Hello for Business Key and Certificate Trust Windows
  • Database Collation
    Change SQL Database Collation: ePO events DB and SQL server should match with ePO core collation Oracle/MSSQL/MySQL
  • PowerShell 1
    How to upgrade PowerShell to the latest version on macOS via Homebrew Mac

Subscribe to Blog via Email

Enter your email address to subscribe to this blog and receive notifications of new posts by email.

Join 1,839 other subscribers
  • RSS - Posts
  • RSS - Comments
  • About
  • Authors
  • Write for us
  • Advertise with us
  • General Terms and Conditions
  • Privacy policy
  • Feedly
  • Telegram
  • Youtube
  • Facebook
  • Instagram
  • LinkedIn
  • Tumblr
  • Pinterest
  • Twitter
  • mastodon

Tags

AWS Azure Bitlocker Microsoft Windows PowerShell WDS Windows 10 Windows 11 Windows Deployment Services Windows Server 2016

Copyright © 2025 TechDirectArchive

 

Loading Comments...
 

You must be logged in to post a comment.