PrintNightMare vulnerability patch is flawed, attackers can still 'break through'
However, this urgently released patch still exposes flaws.
Microsoft only fixed the remote code exploit, which means the vulnerability can still be used for local privilege escalation (LPE). In addition, hackers soon discovered that this vulnerability could still be exploited remotely.
According to Mimikatz expert Benjamin Delpy, hackers can bypass the patch to gain SYSTEM permissions if the Point and Print policy is enabled.
PrintNightMare vulnerability patch is flawed, attackers can still 'break through' Picture 1
This has been confirmed by Will Dorman, CERT/CC vulnerability analyst.
PrintNightMare vulnerability patch is flawed, attackers can still 'break through' Picture 2
To bypass the PrintNightmare patch and achieve RCE and LPE, the 'Point and Print Restrictions' policy must be enabled and the 'When installing drivers for a new connection' setting configured to 'Do not show warning on elevation prompt'.
Currently, security researchers recommend that administrators disable the Print Spooler service until all problems are completely fixed or block remote printing to the machine through Group Policy.
You can follow these steps to disable the Print Spooler service through PowerShell:
- Open PowerShell as Administrator
- Stop-Service -Name Spooler -Force
- Set-Service -Name Spooler -StartupType Disabled
Alternatively, you can send to remote printing to the machine via Group Policy by performing the following steps:
- Open Group Policy Editor
- Go to Computer Configuration/ Administrative Templates/ Printers
- Disable the 'Allow Print Spooler to accept client connections:' policy
Microsoft has updated the MSRC listing to note that it is rolling out patches for Windows Server 2012, Windows Server 2016 and Windows 10, Version 1607. The company adds that for system security, users "must verify get the below registry setting set to 0 or undefined'.
HKEY_LOCAL_MACHINESOFTWAREPoliciesMicrosoftWindows NTPrinters PointAndPrint
NoWarningNoElevationOnInstall = 0 (DWORD) or undefined (default install)
NoWarningNoElevationOnUpdate = 0 (DWORD) or undefined (default setting)
However, Dormann argued that 'NoWaringNoElevationOnInstall=0 did not prevent the exploit. The company also has not yet addressed the reports of other security research firms.
You should read it
- Steps to disable Print Spooler on Windows 10
- Defender for Identity detects PrintNightmare vulnerability, reducing risk for Print Spooler
- What is 'Spooler SubSystem App' and why run on the computer?
- How to restart the Print Spooler service on Windows
- How to fix Print Spooler Error on the printer
- Fix Printer Spooler error code 0x800706b9 on Windows 10
- Fix the spooler print service service not running on Windows 10, 8.1, 7
- Discover more ways to attack the printing system in Windows
- Relax with 3 ways to print in this simple reverse order
- How to print web pages without ads
- How to print Excel, print Excel spreadsheets fast, standard
- How to print A4 to A5 in PDF simple and fast
May be interested
Free Lorenz ransomware decryption tool helps victims recover stolen data
10 tips to keep cloud storage safe and secure
Here's How To Protect Your Business From Illegal Online Marketing And Sales
What to do when you know your computer is infected with ransomware
The security risks of RDP
The Best Guide on Your Account Security