Skip to content

TechDirectArchive

Hands-on IT, Cloud, Security & DevOps Insights

  • Home
  • About
  • Advertise With US
  • Reviews
  • Contact
  • Toggle search form
Home » Security | Vulnerability Scans and Assessment » PrintNightmare security update for Windows Server and Windows 10
  • zoom
    How to update Zoom Desktop Client on macOS Mac
  • PassTheHash
    What is Pass the Hash Attack and how to mitigate the attack Security | Vulnerability Scans and Assessment
  • https   blogs images.forbes.com jasonevangelho files 2018 06 windows 7 2018 edition 1200x676 1
    Windows deployment cannot continue, the operating system is missing via MDT deployment Windows Server
  • xxxxxx
    How to move the Taskbar to a second screen in Windows Windows
  • Chocolatey Packages
    Create Chocolatey Package: Upgrade Software with Chocolatey Scripts
  • image 73
    How to manage and use Amazon S3 access points using the AWS Management Console AWS/Azure/OpenShift
  • WonderFox Video Watermark
    Install and use WonderFox Video Watermark Windows
  • VPNonWindows
    Configure VPN on Windows Server: How to allow remote VPN Access for Domain or Local Users Windows Server

PrintNightmare security update for Windows Server and Windows 10

Posted on 08/07/202120/03/2023 Christian By Christian No Comments on PrintNightmare security update for Windows Server and Windows 10
PrintNightMare-1

A remote code execution vulnerability exists when the Windows Print Spooler service improperly performs privileged file operations. An attacker who successfully exploited this vulnerability could run arbitrary code with SYSTEM privileges. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. The “PrintNightmare patch” is now available for all versions of Windows. In this article, we will discuss the following topic “PrintNightmare security update for Windows Server 2012, 2016, and Windows 10, v1607 released: Why are the patches not so effective for the Print Spooler vulnerability?”

Why are the Patches not effective for the Print Spooler vulnerability?

According to security researchers, however, it does not completely protect against attacks. They found out that attacks are still possible. Microsoft has classified the security vulnerability (CVE-2021-34527) in the Windows print spooler as ” critical “. After a successful attack, attackers could execute arbitrary code with system rights.

UPDATE from July 7, 2021: The security update for Windows Server 2012, Windows Server 2016, and Windows 10, Version 1607 have been released. Please see the Out-of-Band Security Update for PrintNightmare. We recommend that you install these updates immediately. If you are unable to install these updates, Ensure you implement the Workaround as discussed in this guide "mitigate Print Spooler Vulnerability “PrintNightmare”: Disable Print Spooler Service or disable inbound remote printing through Group Policy“ in order to help protect your system from this vulnerability.

Installing July 2021 Out-of-band Updates

After installing the July 2021 Out-of-band updates, non-administrators are only allowed to install signed print drivers to a print server. By default, administrators can install both signed and unsigned printer drivers to a print server. Signed drivers are trusted by the installed root certificates in the system’s Trusted Root Certification Authorities.

Note: This Patch may NEVER be effective if the “NoWarningNoElevationOnInstall” is set to 1 or the GPO is enabled. These are the most recent findings by the CERT Coordination Center (Software Engineering Institute) researchers and “Carnegie Mellon University’s CERT” has warned against this as the policy allows computers to connect to a remote printer without an installation medium.

The policy is not activated by default Windows and it can be assumed that the policy is mainly used by administrators in the corporate environment in order to simplify printing for non-administrators. Accordingly, admins should check in the editor for local group policies under Administrative Templates, Printers, Point, and Print Restrictions whether the service is configured and active.

Screenshot-2021-07-08-at-19.10.37
Screenshot 2021 07 08 at 19.10.37
Screenshot-2021-07-08-at-19.09.41
Screenshot 2021 07 08 at 19.09.41
In order to secure your system, you must confirm that the following registry settings are set to 0 (zero) or are not defined. See this link if you wish to read more.
Note: These registry keys do not exist by default, and therefore are already at the secure setting.
- HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows NT\Printers\PointAndPrint
- NoWarningNoElevationOnInstall = 0 (DWORD) or not defined (default setting)
- NoWarningNoElevationOnUpdate = 0 (DWORD) or not defined (default setting)
Therefore, having "NoWarningNoElevationOnInstall" set to 1 makes your system vulnerable by design. As you can see below, I do not have the policy defined, therefore, with this patch, I am protected :) 
Screenshot-2021-07-08-at-19.04.28

But if you have the “NoWarningNoElevationOnInstall” set to 1 (or GPO Policy enabled), this patch does not protect you. please follow the recommendations discussed in this guide “how to mitigate Print Spooler Vulnerability “PrintNightmare”: Disable Print Spooler Service or disable inbound remote printing through Group Policy“.

I hope you found this blog post helpful. In this article, you have learned about the PrintNightmare security update for Windows Server 2012, 2016, and Windows 10 v1607 and why the patches are not so effective for the Print Spooler vulnerability. If you have any questions, please let me know in the comment session.

Rate this post

Thank you for reading this post. Kindly share it with others.

  • Click to share on X (Opens in new window) X
  • Click to share on Reddit (Opens in new window) Reddit
  • Click to share on LinkedIn (Opens in new window) LinkedIn
  • Click to share on Facebook (Opens in new window) Facebook
  • Click to share on Pinterest (Opens in new window) Pinterest
  • Click to share on Tumblr (Opens in new window) Tumblr
  • Click to share on Telegram (Opens in new window) Telegram
  • Click to share on WhatsApp (Opens in new window) WhatsApp
  • Click to share on Pocket (Opens in new window) Pocket
  • Click to share on Mastodon (Opens in new window) Mastodon
  • Click to share on Bluesky (Opens in new window) Bluesky
  • Click to share on Threads (Opens in new window) Threads
  • Click to share on Nextdoor (Opens in new window) Nextdoor
Security | Vulnerability Scans and Assessment Tags:Printer, Printer Management, Printing, Windows 10, Windows Server 2016

Post navigation

Previous Post: Install and Configure Hyper-V on Windows Server Server 2019, and 2022 via the Server Manager, PowerShell or DISM
Next Post: Best Free Disk Cloning Software to Clone a Hard Drive

Related Posts

  • WindowsCoreSecurity
    How to enable Smart App Control on Windows 11 Security | Vulnerability Scans and Assessment
  • rrd
    How to uninstall the DriveLock Agent from your device Security | Vulnerability Scans and Assessment
  • azure just in time
    How to secure access to your Virtual Machine with Just-in-Time (JIT) VM Access AWS/Azure/OpenShift
  • Protech Synology NAS
    Cybersecurity Tips to Secure Synology NAS against Ransomware Reviews
  • banner
    How to Secure your API key in Postman Password Manager
  • Complete Guide on TestRail as a Test Management Tool   banner
    Complete Guide on TestRail as a Test Management Tool Security | Vulnerability Scans and Assessment

More Related Articles

WindowsCoreSecurity How to enable Smart App Control on Windows 11 Security | Vulnerability Scans and Assessment
rrd How to uninstall the DriveLock Agent from your device Security | Vulnerability Scans and Assessment
azure just in time How to secure access to your Virtual Machine with Just-in-Time (JIT) VM Access AWS/Azure/OpenShift
Protech Synology NAS Cybersecurity Tips to Secure Synology NAS against Ransomware Reviews
banner How to Secure your API key in Postman Password Manager
Complete Guide on TestRail as a Test Management Tool   banner Complete Guide on TestRail as a Test Management Tool Security | Vulnerability Scans and Assessment

Leave a Reply Cancel reply

You must be logged in to post a comment.

Microsoft MVP

VEEAMLEGEND

vexpert-badge-stars-5

Virtual Background

GoogleNews

Categories

veeaam100

sysadmin top30a

  • zoom
    How to update Zoom Desktop Client on macOS Mac
  • PassTheHash
    What is Pass the Hash Attack and how to mitigate the attack Security | Vulnerability Scans and Assessment
  • https   blogs images.forbes.com jasonevangelho files 2018 06 windows 7 2018 edition 1200x676 1
    Windows deployment cannot continue, the operating system is missing via MDT deployment Windows Server
  • xxxxxx
    How to move the Taskbar to a second screen in Windows Windows
  • Chocolatey Packages
    Create Chocolatey Package: Upgrade Software with Chocolatey Scripts
  • image 73
    How to manage and use Amazon S3 access points using the AWS Management Console AWS/Azure/OpenShift
  • WonderFox Video Watermark
    Install and use WonderFox Video Watermark Windows
  • VPNonWindows
    Configure VPN on Windows Server: How to allow remote VPN Access for Domain or Local Users Windows Server

Subscribe to Blog via Email

Enter your email address to subscribe to this blog and receive notifications of new posts by email.

Join 1,836 other subscribers
  • RSS - Posts
  • RSS - Comments
  • About
  • Authors
  • Write for us
  • Advertise with us
  • General Terms and Conditions
  • Privacy policy
  • Feedly
  • Telegram
  • Youtube
  • Facebook
  • Instagram
  • LinkedIn
  • Tumblr
  • Pinterest
  • Twitter
  • mastodon

Tags

Active Directory AWS Azure Bitlocker Microsoft Windows PowerShell WDS Windows 10 Windows 11 Windows Server 2016

Copyright © 2025 TechDirectArchive

 

Loading Comments...
 

You must be logged in to post a comment.