Skip to content

TechDirectArchive

Hands-on IT, Cloud, Security & DevOps Insights

  • Home
  • About
  • Advertise With US
  • Reviews
  • Contact
  • Toggle search form
Home » Security | Vulnerability Scans and Assessment » Out-of-Band Security Update for PrintNightmare: Patch released for Windows Print Spooler Remote Code Execution Vulnerability

Out-of-Band Security Update for PrintNightmare: Patch released for Windows Print Spooler Remote Code Execution Vulnerability

Posted on 07/07/202101/09/2023 Christian By Christian No Comments on Out-of-Band Security Update for PrintNightmare: Patch released for Windows Print Spooler Remote Code Execution Vulnerability
Security Patch

Microsoft has released an Out-of-Band (OOB) security update for CVE-2021-34527, which is also referred to as PrintNightmare. This is a cumulative update release. Therefore, it contains all previous security fixes and should be applied immediately to fully protect your systems.  This fix addresses the public known Print Spooler vulnerability (PrintNightmare). It also includes a new feature that allows customers to implement stronger protections. See this knowledge base article for more information “KB5005010”: Restricting installation of new printer drivers after applying the July 6, 2021 updates.

A remote code execution vulnerability exists when the Windows Print Spooler service improperly performs privileged file operations. An attacker who successfully exploited this vulnerability could run arbitrary code with SYSTEM privileges. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.

The released patch as previously discussed in the first paragraph was released on July 6, 2021 and it contain protections for CVE-2021-1675 and the additional remote code execution exploit in the Windows Print Spooler service known as “PrintNightmare”, documented in CVE-2021-34527.
- July 7th, 2021, the PrintNightmare security update for Windows Server 2012, 2016, and Windows 10, v1607 has been released. But why are the Out-of-Band patches not effective for the Print Spooler vulnerability?

Note: Not all versions of the update are available today as some packages are not quite ready for release. The following security updates for Windows Server 2016, Windows 10, version 1607, and Windows Server 2012 are currently being delayed for a short period but they are expected soon. In this case, you may want to refer to this guide on “how to mitigate Print Spooler Vulnerability “PrintNightmare”: Disable Print Spooler Service or disable inbound remote printing through Group Policy“.

How to get this update:

Before installing this update, Microsoft has combined the latest Servicing Stack Update (SSU) for your operating system with the latest cumulative update (LCU). Kindly refer to this guide to learn more about the servicing stack update and the latest cumulative update in Windows.

Prerequisite for Windows Server Update Services (WSUS) deployment:
– For Windows Server Update Services (WSUS) deployment: Install the May 11, 2021 update (KB5003173) before you install the latest cumulative update.
– For offline Deployment Image Servicing and Management (DISM.exe) deployment:If an image does not have the February 24, 2021 (KB4601382) or later cumulative update, install the January 12, 2021 “SSU (KB4598481)” and the May 11, 2021 update (KB5003173).

Install this update: The tables below show how this can be applied.

Release ChannelAvailableNext Step
Windows Update or Microsoft UpdateYesNothing else needs to be done.
– This update will be downloaded and installed automatically from Windows Update.

To manually check for updates, follow the steps discussed below.
– Select the Start (Windows) button from the bottom-left corner,
– Go to Settings (gear icon),
– Select the Update & Security icon,
– Choose the Windows Update tab in the left sidebar
– Click the Check for updates button. If there is an available update, it will begin downloading automatically.

Windows Vulnerability
Ensure you search for updates and apply them accordingly.
As you can see in the image below, I have successfully patched this workstation.

For Windows Server Update Services (WSUS), Windows Update for Business, and Microsoft Update Catalog. Kindly see the table below.

Release ChannelAvailableNext Step
Windows Update for BusinessYesNothing else needs to be done.
– These changes will be included in the next security update to this channel.
Windows Server Update Services (WSUS)YesThis update will automatically sync with WSUS if you configure Products and Classifications as follows: Product: Windows 10, version 1903, and later. Classification: Security Updates
Microsoft Update CatalogYesTo get the standalone package for this update, go to the Microsoft Update Catalog website. The “Microsoft Update Catalog” table below shows how to search for the package and have it downloaded.
Screenshot-2021-07-07-at-15.21.10

Known issues for (Out-of-Band (OOB) security update for CVE-2021-34527).

SymptomsWorkaround
When using the Microsoft Japanese Input Method Editor (IME) to enter Kanji characters in an app that automatically allows the input of Furigana characters, you might not get the correct Furigana characters.

You might need to enter the Furigana characters manually. Note The affected apps are using the ImmGetCompositionString() function.
We are working on a resolution and will provide an update in an upcoming release.
Devices with Windows installations created from custom offline media or custom ISO image might have Microsoft Edge Legacy removed by this update, but not automatically replaced by the new Microsoft Edge.

This issue is only encountered when custom offline media or ISO images are created by slipstreaming this update into the image without having first installed the standalone servicing stack update (SSU) released March 29, 2021 or later.

Note: This does not affect devices that connect directly to Windows Update to receive updates. This includes devices using Windows Update for Business. Any device connecting to Windows Update should always receive the latest versions of the SSU and the latest cumulative update (LCU) without any extra steps.
To avoid this issue, be sure to first slipstream the SSU released March 29, 2021 or later into the custom offline media or ISO image before slipstreaming the LCU.

To do this with the combined SSU and LCU packages used for Windows 10, version 20H2 and Windows 10, version 2004, you will need to extract the SSU from the combined package. Use the following steps to extract the using SSU.

Extract the cab from the msu via this command line and slipstream this file into your offline image first, then the LCU.

If you have already encountered this issue by installing the OS using affected custom media, you can mitigate it by directly installing the new Microsoft Edge. If you need to broadly deploy the new Microsoft Edge for business, see Download and deploy Microsoft Edge for business
In order to secure your system, you must confirm that the following registry settings are set to 0 (zero) or are not defined.

Note: These registry keys do not exist by default, and therefore are already at the secure setting.

- HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows NT\Printers\PointAndPrint
- NoWarningNoElevationOnInstall = 0 (DWORD) or not defined (default setting)
- NoWarningNoElevationOnUpdate = 0 (DWORD) or not defined (default setting)

After installing the July 2021 Out-of-band updates, non-administrators are only allowed to install signed print drivers to a print server. By default, administrators can install both signed and unsigned printer drivers to a print server. Signed drivers are trusted by the installed root certificates in the system’s Trusted Root Certification Authorities.

I hope you found this blog post helpful. If you have any questions, please let me know in the comment session.

Rate this post

Thank you for reading this post. Kindly share it with others.

  • Share on X (Opens in new window) X
  • Share on Reddit (Opens in new window) Reddit
  • Share on LinkedIn (Opens in new window) LinkedIn
  • Share on Facebook (Opens in new window) Facebook
  • Share on Pinterest (Opens in new window) Pinterest
  • Share on Tumblr (Opens in new window) Tumblr
  • Share on Telegram (Opens in new window) Telegram
  • Share on WhatsApp (Opens in new window) WhatsApp
  • Share on Mastodon (Opens in new window) Mastodon
  • Share on Bluesky (Opens in new window) Bluesky
  • Share on Threads (Opens in new window) Threads
  • Share on Nextdoor (Opens in new window) Nextdoor
Security | Vulnerability Scans and Assessment Tags:Microsoft Windows, updates, vulnerability, Windows 10, Windows Server 2016, Windows Updates

Post navigation

Previous Post: An error occurred while attempting to connect to the server: Check if the Virtual Machine Management service is running or you are not authorized to connect to this server
Next Post: The validation process found problems on the server to which you want to install features, the features are not compatible with the current configuration of your server

Related Posts

  • Screenshot 2022 03 29 at 19.47.05
    CVE-2022-22948: Patch available to address vCenter Server information disclosure vulnerability  Security | Vulnerability Scans and Assessment
  • drivelock 1280x720 1
    Concept of DriveLock with a focus on Encryption Security | Vulnerability Scans and Assessment
  • ePO PIA Tool
    Fixes to Trellix ePolicy Orchestrator Installation Errors Security | Vulnerability Scans and Assessment
  • Feature image 1
    Configure and validate Exclusions for Microsoft Defender Antivirus scans Anti-Virus Solution
  • Change BitLocker Password in Windows
    How to Change BitLocker Password in Windows Security | Vulnerability Scans and Assessment
  • Trellix Upgrade
    Trellix ePO On-prem 5.10.0 Service pack 1 Update 3 upgrade Security | Vulnerability Scans and Assessment

More Related Articles

Screenshot 2022 03 29 at 19.47.05 CVE-2022-22948: Patch available to address vCenter Server information disclosure vulnerability  Security | Vulnerability Scans and Assessment
drivelock 1280x720 1 Concept of DriveLock with a focus on Encryption Security | Vulnerability Scans and Assessment
ePO PIA Tool Fixes to Trellix ePolicy Orchestrator Installation Errors Security | Vulnerability Scans and Assessment
Feature image 1 Configure and validate Exclusions for Microsoft Defender Antivirus scans Anti-Virus Solution
Change BitLocker Password in Windows How to Change BitLocker Password in Windows Security | Vulnerability Scans and Assessment
Trellix Upgrade Trellix ePO On-prem 5.10.0 Service pack 1 Update 3 upgrade Security | Vulnerability Scans and Assessment

Leave a Reply Cancel reply

You must be logged in to post a comment.

Microsoft MVP

VEEAMLEGEND

vexpert-badge-stars-5

Virtual Background

GoogleNews

Categories

veeaam100

Veeam Vanguard

  • ClearTPM
    Clear TPM via Management Console or Windows Defender Center App Windows
  • Ec2 Instance
    How to create an EC2 Instance AWS/Azure/OpenShift
  • Featured image Windows Security
    How to clear Cache and Manually Update Microsoft Defender Anti-Virus Solution
  • KIOSK AssignedAccess
    Windows Single or Multi App Kiosks Windows
  • Watchguard Firewall 180504 100511 1
    WatchGuard Firebox: Restoring Backups on XTM Device Network | Monitoring
  • Time machine
    How to Backup MacOS to Synology NAS via Time Machine Backup
  • ShieldServersSmall
    How to track your device performance and health via Windows Security in Windows 10 Windows
  • banner
    Fix npm install hangs on “sill idealTree buildDeps” Linux

Subscribe to Blog via Email

Enter your email address to subscribe to this blog and receive notifications of new posts by email.

Join 1,819 other subscribers
  • RSS - Posts
  • RSS - Comments
  • About
  • Authors
  • Write for us
  • Advertise with us
  • General Terms and Conditions
  • Privacy policy
  • Feedly
  • Telegram
  • Youtube
  • Facebook
  • Instagram
  • LinkedIn
  • Tumblr
  • Pinterest
  • Twitter
  • mastodon

Tags

Active Directory Azure Bitlocker Microsoft Windows PowerShell WDS Windows 10 Windows 11 Windows Deployment Services Windows Server 2016

Copyright © 2025 TechDirectArchive

 

Loading Comments...
 

You must be logged in to post a comment.