PrintNightmare
CVE identifier(s) | CVE-2021-1675 CVE-2021-34527 |
---|---|
Date discovered | June 29, 2021 |
Date patched | July 6, 2021[1] |
Discoverer | Sangfor[2][3] |
Affected software | Microsoft Windows |
PrintNightmare is a critical security vulnerability affecting the Microsoft Windows operating system.[2][4] The vulnerability occurred within the print spooler service.[5][6] There were two variants, one permitting remote code execution (CVE-2021-34527), and the other leading to privilege escalation (CVE-2021-1675).[6][7] A third vulnerability (CVE-2021-34481) was announced July 15, 2021, and upgraded to remote code execution by Microsoft in August.[8][9]
On July 6, 2021, Microsoft started releasing out-of-band (unscheduled) patches attempting to address the vulnerability.[10] Due to its severity, Microsoft released patches for Windows 7, for which support had ended in January 2020.[11][10] The patches resulted in some printers ceasing to function.[12][13] Researchers have noted that the vulnerability has not been fully addressed by the patches.[14] After the patch is applied, only administrator accounts on Windows print server will be able to install printer drivers.[15] Part of the vulnerability related to the ability of non-administrators to install printer drivers on the system, such as shared printers on system without sharing password protection.[15]
The organization which discovered the vulnerability, Sangfor, published a proof of concept in a public GitHub repository.[3][16] Apparently published in error, or as a result of a miscommunication between the researchers and Microsoft, the proof of concept was deleted shortly after.[3][17] However, several copies have since appeared online.[3]
See also
References
- ↑ "July 6, 2021—KB5004945 (OS Builds 19041.1083, 19042.1083, and 19043.1083) Out-of-band". Microsoft Corporation. https://support.microsoft.com/en-us/topic/july-6-2021-kb5004945-os-builds-19041-1083-19042-1083-and-19043-1083-out-of-band-44b34928-0a71-4473-aa22-ecf3b83eed0e.
- ↑ 2.0 2.1 Valinsky, Jordan (9 July 2021). "Microsoft issues urgent security warning: Update your PC immediately". https://edition.cnn.com/2021/07/07/tech/microsoft-security-update/index.html.
- ↑ 3.0 3.1 3.2 3.3 Corfield, Gareth (30 June 2021). "Leaked print spooler exploit lets Windows users remotely execute code as system on your domain controller" (in en). https://www.theregister.com/2021/06/30/windows_print_spool_vuln_rce/.
- ↑ "Microsoft fixes critical PrintNightmare bug". 7 July 2021. https://www.bbc.com/news/technology-57750138.
- ↑ Winder, Davey (2 July 2021). "New Critical Security Warning Issued For All Windows Versions As 'PrintNightmare' Confirmed" (in en). https://www.forbes.com/sites/daveywinder/2021/07/02/new-critical-security-warning-issued-for-all-windows-versions-as-printnightmare-confirmed/?sh=7b55712b7d04.
- ↑ 6.0 6.1 "Security Update Guide - Microsoft Security Response Center". Microsoft Corporation. https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-34527.
- ↑ "Microsoft Releases Out-of-Band Security Updates for PrintNightmare". Cybersecurity and Infrastructure Security Agency. 6 July 2021. https://us-cert.cisa.gov/ncas/current-activity/2021/07/06/microsoft-releases-out-band-security-updates-printnightmare.
- ↑ "More PrintNightmare: "We TOLD you not to turn the Print Spooler back on!"" (in en-US). 2021-07-16. https://nakedsecurity.sophos.com/2021/07/16/more-printnightmare-we-told-you-not-to-turn-the-print-spooler-back-on/.
- ↑ "Windows Print Spooler Remote Code Execution Vulnerability CVE-2021-34481". https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-34481.
- ↑ 10.0 10.1 "Out-of-Band (OOB) Security Update available for CVE-2021-34527 – Microsoft Security Response Center". Microsoft Corporation. https://msrc-blog.microsoft.com/2021/07/06/out-of-band-oob-security-update-available-for-cve-2021-34527/.
- ↑ Sharwood, Simon (7 July 2021). "Microsoft patches PrintNightmare – even on Windows 7 – but the terror isn't over" (in en). https://www.theregister.com/2021/07/07/printnightmare_patched/.
- ↑ Smith, Adam (9 July 2021). "Microsoft fixes huge security bug – and breaks people's printers" (in en). https://www.independent.co.uk/life-style/gadgets-and-tech/microsoft-printnightmare-windows-printers-update-b1881109.html.
- ↑ Lawler, Richard (8 July 2021). "The Windows update to fix 'PrintNightmare' made some printers stop working" (in en). Vox Media. https://www.theverge.com/2021/7/8/22569387/zebra-windows-security-update-printer-spooler-microsoft.
- ↑ Goodin, Dan (8 July 2021). "Microsoft Keeps Failing to Patch the Critical 'PrintNightmare' Bug". Wired (Condé Nast). https://www.wired.com/story/microsoft-keeps-failing-patch-windows-printnightmare-bug/. Retrieved 11 July 2021.
- ↑ 15.0 15.1 Mackie, Kurt (9 July 2021). "Microsoft Clarifies Its 'PrintNightmare' Patch Advice -- Redmondmag.com". 1105 Media Inc. https://redmondmag.com/articles/2021/07/09/microsoft-clarifies-printnightmare-advice.aspx.
- ↑ Constantin, Lucian (8 July 2021). "PrintNightmare vulnerability explained: Exploits, patches, and workarounds". IDG Communications. https://www.arnnet.com.au/article/689631/printnightmare-vulnerability-explained-exploits-patches-workarounds/.
- ↑ Warren, Tom (2 July 2021). "Microsoft warns of Windows "PrintNightmare" vulnerability that's being actively exploited" (in en). Vox Media. https://www.theverge.com/2021/7/2/22560435/microsoft-printnightmare-windows-print-spooler-service-vulnerability-exploit-0-day.
Original source: https://en.wikipedia.org/wiki/PrintNightmare.
Read more |