Skip to content

TechDirectArchive

Hands-on IT, Cloud, Security & DevOps Insights

  • Home
  • About
  • Advertise With US
  • Contact
  • Reviews
  • Toggle search form
Home » Security | Vulnerability Scans and Assessment » Out-of-Band Security Update for PrintNightmare: Patch released for Windows Print Spooler Remote Code Execution Vulnerability

Out-of-Band Security Update for PrintNightmare: Patch released for Windows Print Spooler Remote Code Execution Vulnerability

Posted on 07/07/202101/09/2023 Christian By Christian No Comments on Out-of-Band Security Update for PrintNightmare: Patch released for Windows Print Spooler Remote Code Execution Vulnerability
Security Patch

Microsoft has released an Out-of-Band (OOB) security update for CVE-2021-34527, which is also referred to as PrintNightmare. This is a cumulative update release. Therefore, it contains all previous security fixes and should be applied immediately to fully protect your systems.  This fix addresses the public known Print Spooler vulnerability (PrintNightmare). It also includes a new feature that allows customers to implement stronger protections. See this knowledge base article for more information “KB5005010”: Restricting installation of new printer drivers after applying the July 6, 2021 updates.

A remote code execution vulnerability exists when the Windows Print Spooler service improperly performs privileged file operations. An attacker who successfully exploited this vulnerability could run arbitrary code with SYSTEM privileges. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.

The released patch as previously discussed in the first paragraph was released on July 6, 2021 and it contain protections for CVE-2021-1675 and the additional remote code execution exploit in the Windows Print Spooler service known as “PrintNightmare”, documented in CVE-2021-34527.
- July 7th, 2021, the PrintNightmare security update for Windows Server 2012, 2016, and Windows 10, v1607 has been released. But why are the Out-of-Band patches not effective for the Print Spooler vulnerability?

Note: Not all versions of the update are available today as some packages are not quite ready for release. The following security updates for Windows Server 2016, Windows 10, version 1607, and Windows Server 2012 are currently being delayed for a short period but they are expected soon. In this case, you may want to refer to this guide on “how to mitigate Print Spooler Vulnerability “PrintNightmare”: Disable Print Spooler Service or disable inbound remote printing through Group Policy“.

How to get this update:

Before installing this update, Microsoft has combined the latest Servicing Stack Update (SSU) for your operating system with the latest cumulative update (LCU). Kindly refer to this guide to learn more about the servicing stack update and the latest cumulative update in Windows.

Prerequisite for Windows Server Update Services (WSUS) deployment:
– For Windows Server Update Services (WSUS) deployment: Install the May 11, 2021 update (KB5003173) before you install the latest cumulative update.
– For offline Deployment Image Servicing and Management (DISM.exe) deployment:If an image does not have the February 24, 2021 (KB4601382) or later cumulative update, install the January 12, 2021 “SSU (KB4598481)” and the May 11, 2021 update (KB5003173).

Install this update: The tables below show how this can be applied.

Release ChannelAvailableNext Step
Windows Update or Microsoft UpdateYesNothing else needs to be done.
– This update will be downloaded and installed automatically from Windows Update.

To manually check for updates, follow the steps discussed below.
– Select the Start (Windows) button from the bottom-left corner,
– Go to Settings (gear icon),
– Select the Update & Security icon,
– Choose the Windows Update tab in the left sidebar
– Click the Check for updates button. If there is an available update, it will begin downloading automatically.

Windows Vulnerability
Ensure you search for updates and apply them accordingly.
As you can see in the image below, I have successfully patched this workstation.

For Windows Server Update Services (WSUS), Windows Update for Business, and Microsoft Update Catalog. Kindly see the table below.

Release ChannelAvailableNext Step
Windows Update for BusinessYesNothing else needs to be done.
– These changes will be included in the next security update to this channel.
Windows Server Update Services (WSUS)YesThis update will automatically sync with WSUS if you configure Products and Classifications as follows: Product: Windows 10, version 1903, and later. Classification: Security Updates
Microsoft Update CatalogYesTo get the standalone package for this update, go to the Microsoft Update Catalog website. The “Microsoft Update Catalog” table below shows how to search for the package and have it downloaded.
Screenshot-2021-07-07-at-15.21.10

Known issues for (Out-of-Band (OOB) security update for CVE-2021-34527).

SymptomsWorkaround
When using the Microsoft Japanese Input Method Editor (IME) to enter Kanji characters in an app that automatically allows the input of Furigana characters, you might not get the correct Furigana characters.

You might need to enter the Furigana characters manually. Note The affected apps are using the ImmGetCompositionString() function.
We are working on a resolution and will provide an update in an upcoming release.
Devices with Windows installations created from custom offline media or custom ISO image might have Microsoft Edge Legacy removed by this update, but not automatically replaced by the new Microsoft Edge.

This issue is only encountered when custom offline media or ISO images are created by slipstreaming this update into the image without having first installed the standalone servicing stack update (SSU) released March 29, 2021 or later.

Note: This does not affect devices that connect directly to Windows Update to receive updates. This includes devices using Windows Update for Business. Any device connecting to Windows Update should always receive the latest versions of the SSU and the latest cumulative update (LCU) without any extra steps.
To avoid this issue, be sure to first slipstream the SSU released March 29, 2021 or later into the custom offline media or ISO image before slipstreaming the LCU.

To do this with the combined SSU and LCU packages used for Windows 10, version 20H2 and Windows 10, version 2004, you will need to extract the SSU from the combined package. Use the following steps to extract the using SSU.

Extract the cab from the msu via this command line and slipstream this file into your offline image first, then the LCU.

If you have already encountered this issue by installing the OS using affected custom media, you can mitigate it by directly installing the new Microsoft Edge. If you need to broadly deploy the new Microsoft Edge for business, see Download and deploy Microsoft Edge for business
In order to secure your system, you must confirm that the following registry settings are set to 0 (zero) or are not defined.

Note: These registry keys do not exist by default, and therefore are already at the secure setting.

- HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows NT\Printers\PointAndPrint
- NoWarningNoElevationOnInstall = 0 (DWORD) or not defined (default setting)
- NoWarningNoElevationOnUpdate = 0 (DWORD) or not defined (default setting)

After installing the July 2021 Out-of-band updates, non-administrators are only allowed to install signed print drivers to a print server. By default, administrators can install both signed and unsigned printer drivers to a print server. Signed drivers are trusted by the installed root certificates in the system’s Trusted Root Certification Authorities.

I hope you found this blog post helpful. If you have any questions, please let me know in the comment session.

Rate this post

Thank you for reading this post. Kindly share it with others.

  • Share on X (Opens in new window) X
  • Share on Reddit (Opens in new window) Reddit
  • Share on LinkedIn (Opens in new window) LinkedIn
  • Share on Facebook (Opens in new window) Facebook
  • Share on Pinterest (Opens in new window) Pinterest
  • Share on Tumblr (Opens in new window) Tumblr
  • Share on Telegram (Opens in new window) Telegram
  • Share on WhatsApp (Opens in new window) WhatsApp
  • Share on Mastodon (Opens in new window) Mastodon
  • Share on Bluesky (Opens in new window) Bluesky
  • Share on Threads (Opens in new window) Threads
  • Share on Nextdoor (Opens in new window) Nextdoor
Security | Vulnerability Scans and Assessment Tags:Microsoft Windows, updates, vulnerability, Windows 10, Windows Server 2016, Windows Updates

Post navigation

Previous Post: An error occurred while attempting to connect to the server: Check if the Virtual Machine Management service is running or you are not authorized to connect to this server
Next Post: The validation process found problems on the server to which you want to install features, the features are not compatible with the current configuration of your server

Related Posts

  • Featured image new
    How to update the BIOS on your Dell system Security | Vulnerability Scans and Assessment
  • Trellix MVISOSN
    How to install Trellix MVISON Endpoint Security | Vulnerability Scans and Assessment
  • ext
    How to install Standalone Installation DriveLock Encryption software Security | Vulnerability Scans and Assessment
  • hero activedirectory 1
    Active Directory Contact and a User Account Object Differences Security | Vulnerability Scans and Assessment
  • Veeam Zero Trust Data Resilience
    Demystifying Zero Trust with Veeam: Design your Architecture Backup
  • Razer
    Administrative rights gained through Razer devices on Windows 10 Security | Vulnerability Scans and Assessment

More Related Articles

Featured image new How to update the BIOS on your Dell system Security | Vulnerability Scans and Assessment
Trellix MVISOSN How to install Trellix MVISON Endpoint Security | Vulnerability Scans and Assessment
ext How to install Standalone Installation DriveLock Encryption software Security | Vulnerability Scans and Assessment
hero activedirectory 1 Active Directory Contact and a User Account Object Differences Security | Vulnerability Scans and Assessment
Veeam Zero Trust Data Resilience Demystifying Zero Trust with Veeam: Design your Architecture Backup
Razer Administrative rights gained through Razer devices on Windows 10 Security | Vulnerability Scans and Assessment

Leave a Reply Cancel reply

You must be logged in to post a comment.

Microsoft MVP

VEEAMLEGEND

vexpert-badge-stars-5

Virtual Background

GoogleNews

Categories

veeaam100

Veeam Vanguard

  • sql stuck
    How to uninstall Microsoft SQL Server Management Studio Oracle/MSSQL/MySQL
  • images copy
    How to disable automatic screen lock in Ubuntu Linux Linux
  • Active Directory Security Hardening with GPO and Policy Analyzer
    Harden Active Directory Using CIS Benchmark and MSCT 1.0 Windows Server
  • vSwitches
    vSwitches: How to delete Virtual Switches from Hyper-V Virtualization
  • VBR patch update
    Patch Veeam Backup and replication 12.3.2.3617 to 12.3.2.4165 Backup
  • connect to RDP automatically
    RDP Configuration Settings: Connect automatically to RDP session Windows
  • sdfgh
    Get a list of installed applications on Windows Scripts
  • Add additional Windows drives
    How to Add Another Hard Drive to a Virtual Machine in HyperV  Virtualization

Subscribe to Blog via Email

Enter your email address to subscribe to this blog and receive notifications of new posts by email.

Join 1,808 other subscribers
  • RSS - Posts
  • RSS - Comments
  • About
  • Authors
  • Write for us
  • Advertise with us
  • General Terms and Conditions
  • Privacy policy
  • Feedly
  • Telegram
  • Youtube
  • Facebook
  • Instagram
  • LinkedIn
  • Tumblr
  • Pinterest
  • Twitter
  • mastodon

Tags

AWS Azure Bitlocker Microsoft Windows PowerShell WDS Windows 10 Windows 11 Windows Deployment Services Windows Server 2016

Copyright © 2025 TechDirectArchive

 

Loading Comments...
 

You must be logged in to post a comment.