Updated July 7, 2021
Threat Overview
The Windows Print Spooler is an application/service that interacts with local or networked printers and manages the printing process. It is an older component that is added by default with Windows installations. On June 21, 2021, researchers discovered that a zero-day flaw in the print spooler allowed for remote code execution (RCE). Unfortunately, the proof of concepts (PoC) for the flaw were exposed in the public domain.
Update: Microsoft has since clarified that CVE-2021-1675 is a separate vulnerability, though similar to the one known as PrintNightmare. CVE-2021-1675 addresses a different vulnerability in the RpcAddPrinterDriverEx() as well as a different attack vector. This blog post covers recommendations for PrintNightmare which is now being tracked as CVE-2021-34527. On their vulnerability update page, Microsoft explains the following pertaining to PrintNightmare:
- A remote code execution (RCE) vulnerability exists when the Windows Print Spooler service improperly performs privileged file operations.
- An attacker who successfully exploited this vulnerability could run arbitrary code with SYSTEM privileges. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.
- An attack must involve an authenticated user calling RpcAddPrinterDriverEx().