Skip to content

TechDirectArchive

Hands-on IT, Cloud, Security & DevOps Insights

  • Home
  • About
  • Advertise With US
  • Reviews
  • Contact
  • Toggle search form
Home » Security | Vulnerability Scans and Assessment » Mitigate Windows Print Spooler Remote Code Execution Vulnerability
  • feature photo terraform
    How to install Amazon RDS using Terraform Linux
  • NortonEvents
    View and Clear or Print Norton Security Events on a Mac Anti-Virus Solution
  • PRIVATE DOCKER REGISTRY
    How to Set up Private Docker Registry Containers
  • img 5be0c6cdb96d8
    Is BitLocker Enabled? How to view BitLocker Disk Encryption Status in Windows Windows
  • Featured image 2
    Enable Microsoft Defender SmartScreen: How to prevent Exe files from getting deleted randomly in Windows 10 and 11 Security | Vulnerability Scans and Assessment
  • settings app not working featured 800x400 1
    Disable or Remove Kiosk Mode Via the Local Settings Windows
  • Delete Edit or Revert a Snapshot on vSphere
    Manage VMware Snapshots: Delete or Edit or Revert a Snapshot Virtualization
  • add or remove features on the specified server failed
    Error 0x80073701: The request to add or remove features on the specified server failed Windows Server

Mitigate Windows Print Spooler Remote Code Execution Vulnerability

Posted on 12/08/202130/05/2023 Christian By Christian No Comments on Mitigate Windows Print Spooler Remote Code Execution Vulnerability
Print-Spooler

Microsoft has issued an advisory for another zero-day Windows print spooler vulnerability tracked as CVE-2021-36958 that allows local attackers to gain SYSTEM privileges on a computer. As stated by Microsoft, a “remote code execution vulnerability exists when the Windows Print Spooler service improperly performs privileged file operations. An attacker who successfully exploits this vulnerability could run arbitrary code with SYSTEM privileges. An attacker could then install programs; view, change or delete data; or create new accounts with full user rights”. Kindly refer to this guide for the first workaround suggested by Microsoft: How to mitigate Print Spooler Vulnerability “PrintNightmare”: Disable Print Spooler Service or disable inbound remote printing through Group Policy. In this article, you will learn how to CVE-2021-36958: Mitigate Windows Print Spooler Remote Code Execution vulnerability.

Windows Print Spooler Vulnerability

Unlike the previous exploits, this vulnerability affects the Windows print spooler. Windows print drivers, and Windows Point and Print. Kindly refer to some of the PrintNightMare guides I have written in the past. PrintNightmare security update for Windows Server 2012, 2016, and Windows 10, v1607 released: Why are the patches not so effective for the Print Spooler vulnerability? and how to fix Out-of-Band Security Update for PrintNightmare: Patch released for Windows Print Spooler Remote Code Execution Vulnerability.

From the disclosure, it is evident that the vulnerability still persists as unravelled by Benjamin Delpy a security researcher. In his claims, this vulnerability allows threat actors to quickly gain SYSTEM privileges simply by connecting to a remote print server as demonstrated in the video below.

Microsoft has indeed confirmed another Windows print spooler zero-day bug as shown in the figure below and has also provided some workaround to help mitigate this issue.

Screenshot-2021-08-12-at-19.58.56
This vulnerability is part of a class of bugs known as ‘PrintNightmare,’ which abuses configuration settings for the Windows print spooler, print drivers, and the Windows Point and Print feature.

How to mitigate Windows Print Spooler Remote Code Execution Vulnerability

There isn’t a patch (update) at the time of this writing. The good thing is, there is always a workaround. You can disable the Print Spooler service or allow your device to install printers from authorized servers. Below are the steps to perform both operations.

Please see How to remove (uninstall) a printer on a macOS, how to fix Print Spooler Service not running, How to transfer data from an old PC to a new PC, how to change the default Save and Download Location in Windows, and how to fix Print Spooler Service not running.

Disable the Print Spooler Service to fix Print Spooler Remote Code Execution Vulnerability

If disabling the Print Spooler service is appropriate for your enterprise, use the following PowerShell commands.
– First, determine if the Print Spooler service is running via services.msc or PowerShell. If you will be using PowerShell, run the command below.

Get-Service -Name Spooler
Screenshot-2021-08-12-at-20.50.52
Screenshot 2021 08 12 at 20.50.52
Screenshot-2021-08-12-at-20.58.21
Screenshot 2021 08 12 at 20.58.21

To disable the print spooler, please run the following command below on the Domain Controller (DC).

Stop-Service -Name Spooler -Force
Set-Service -Name Spooler -StartupType Disabled
Screenshot-2021-07-02-at-23.05.59

To disable the Print Spooler Service via services.msc. Please follow the steps below.

Screenshot-2021-07-02-at-23.07.55
Screenshot 2021 07 02 at 23.07.55

Select Disabled as shown below

Screenshot-2021-08-12-at-20.53.21
Screenshot 2021 08 12 at 20.53.21
Impact of workaround Stopping and disabling the Print Spooler service disables the ability to print both locally and remotely.

If you wish to start this in the future, kindly launch Windows Services and right-click on the Print Spooler service, and select properties.
– Select a startup type and click on start.

Enable your device to download drivers from Authorized Servers Only

You can also configure the settings via Local Group Policy as shown below. You may want to see this guide before proceeding: What is GPO and how can it be launched in Windows.
– To launch the Local Group Policy console, open the run dialog box, search for “gpedit.msc” or from Windows Search, as shown below.

Screenshot-2021-07-02-at-23.21.12

This will open up the Local Group Policy Editor as shown below. Navigate through the following as described.

Expand the User Configuration, click on the Administrative Templates, and then expand the Control Panel node. Select Printers and click on Package Point and Print — Approved Servers.

Screenshot-2021-08-12-at-21.09.21

This will open the Package Point and Print—Approved Servers settings window.

- Click on Enabled
- Click on show,
- In the list content window, enter the FQDN of the servers as shown in the image below.
Screenshot-2021-08-12-at-21.14.37
Screenshot 2021 08 12 at 21.14.37
Screenshot-2021-08-12-at-21.16.32
Screenshot 2021 08 12 at 21.16.32

When you are done, click on Ok.

Screenshot-2021-08-12-at-21.17.14

Until the patch is released, this workaround should be able to protect you unless the threat actor can take over an authorized print server with malicious drivers.

Update Group Policy

If you wish the policy to take effect immediately without waiting for the default settings, please run any of the following commands discussed in this hyperlink: GPUpdate and GPUpdate /force. Group policy on Windows 10 periodically refreshes the Registry at certain intervals to keep the Registry values in check at all times which is an interval of 90 minutes.

You may want to roll this setting domain-wide to your internal systems. To launch Group Policy from the Domain controller,
– Launch the Server Manager. (Note: you can also use the Windows Administrative Tools for this).
– Under Tool,
– Search for Group Policy Management. This will open up the Group Policy Management Console. You can also use the “Advanced Group Policy Management (AGPM)”.

Screenshot-2021-07-02-at-23.34.35
Follow the same steps as discussed above via the local group policy and link the policy to your Domain or OU.

I hope you found this blog post helpful on how to CVE-2021-36958: Mitigate Windows Print Spooler Remote Code Execution vulnerability. If you have any questions, please let me know in the comment session.

Rate this post

Thank you for reading this post. Kindly share it with others.

  • Click to share on X (Opens in new window) X
  • Click to share on Reddit (Opens in new window) Reddit
  • Click to share on LinkedIn (Opens in new window) LinkedIn
  • Click to share on Facebook (Opens in new window) Facebook
  • Click to share on Pinterest (Opens in new window) Pinterest
  • Click to share on Tumblr (Opens in new window) Tumblr
  • Click to share on Telegram (Opens in new window) Telegram
  • Click to share on WhatsApp (Opens in new window) WhatsApp
  • Click to share on Pocket (Opens in new window) Pocket
  • Click to share on Mastodon (Opens in new window) Mastodon
  • Click to share on Bluesky (Opens in new window) Bluesky
  • Click to share on Threads (Opens in new window) Threads
  • Click to share on Nextdoor (Opens in new window) Nextdoor
Security | Vulnerability Scans and Assessment Tags:Microsoft Windows, Printer, Printer Management, vulnerability, Windows 10, Windows Server 2016

Post navigation

Previous Post: The connection was denied because the user account is not authorized for remote login: How to add and remove Remote Desktop Users
Next Post: Provisioning Azure Resources using Azure Az PowerShell Cmdlet from Cloud Shell

Related Posts

  • DUE Deligence vs Due Care
    Relating Due Diligence and Due Care to Veeam Backup and Replication Backup
  • rrd
    How to uninstall the DriveLock Agent from your device Security | Vulnerability Scans and Assessment
  • Microsoft Defender
    Attack Surface Reduction Configuration with Microsoft Defender Scripts
  • vcenter sign on
    CVE-2021-22048: VMware vCenter Server updates address a privilege escalation vulnerability Security | Vulnerability Scans and Assessment
  • Screenshot 2020 12 29 at 04.08.43
    Enable or disable BitLocker Drive Encryption on Windows Security | Vulnerability Scans and Assessment
  • Featured image 8
    How to restore quarantined files in Microsoft Defender Antivirus Security | Vulnerability Scans and Assessment

More Related Articles

DUE Deligence vs Due Care Relating Due Diligence and Due Care to Veeam Backup and Replication Backup
rrd How to uninstall the DriveLock Agent from your device Security | Vulnerability Scans and Assessment
Microsoft Defender Attack Surface Reduction Configuration with Microsoft Defender Scripts
vcenter sign on CVE-2021-22048: VMware vCenter Server updates address a privilege escalation vulnerability Security | Vulnerability Scans and Assessment
Screenshot 2020 12 29 at 04.08.43 Enable or disable BitLocker Drive Encryption on Windows Security | Vulnerability Scans and Assessment
Featured image 8 How to restore quarantined files in Microsoft Defender Antivirus Security | Vulnerability Scans and Assessment

Leave a Reply Cancel reply

You must be logged in to post a comment.

Microsoft MVP

VEEAMLEGEND

vexpert-badge-stars-5

Virtual Background

GoogleNews

Categories

veeaam100

sysadmin top30a

  • feature photo terraform
    How to install Amazon RDS using Terraform Linux
  • NortonEvents
    View and Clear or Print Norton Security Events on a Mac Anti-Virus Solution
  • PRIVATE DOCKER REGISTRY
    How to Set up Private Docker Registry Containers
  • img 5be0c6cdb96d8
    Is BitLocker Enabled? How to view BitLocker Disk Encryption Status in Windows Windows
  • Featured image 2
    Enable Microsoft Defender SmartScreen: How to prevent Exe files from getting deleted randomly in Windows 10 and 11 Security | Vulnerability Scans and Assessment
  • settings app not working featured 800x400 1
    Disable or Remove Kiosk Mode Via the Local Settings Windows
  • Delete Edit or Revert a Snapshot on vSphere
    Manage VMware Snapshots: Delete or Edit or Revert a Snapshot Virtualization
  • add or remove features on the specified server failed
    Error 0x80073701: The request to add or remove features on the specified server failed Windows Server

Subscribe to Blog via Email

Enter your email address to subscribe to this blog and receive notifications of new posts by email.

Join 1,836 other subscribers
  • RSS - Posts
  • RSS - Comments
  • About
  • Authors
  • Write for us
  • Advertise with us
  • General Terms and Conditions
  • Privacy policy
  • Feedly
  • Telegram
  • Youtube
  • Facebook
  • Instagram
  • LinkedIn
  • Tumblr
  • Pinterest
  • Twitter
  • mastodon

Tags

Active Directory AWS Azure Bitlocker Microsoft Windows PowerShell WDS Windows 10 Windows 11 Windows Server 2016

Copyright © 2025 TechDirectArchive

 

Loading Comments...
 

You must be logged in to post a comment.