Windows 10: Workaround for the Windows Print Spooler Remote Code Execution Vulnerability

Discus and support Workaround for the Windows Print Spooler Remote Code Execution Vulnerability in Windows 10 News to solve the problem; Microsoft disclosed a new remote code execution vulnerability in Windows recently that is using the Windows Print Spooler. The vulnerability is... Discussion in 'Windows 10 News' started by GHacks, Jul 3, 2021.

  1. GHacks
    GHacks New Member

    Workaround for the Windows Print Spooler Remote Code Execution Vulnerability


    Microsoft disclosed a new remote code execution vulnerability in Windows recently that is using the Windows Print Spooler. The vulnerability is actively exploited and Microsoft published two workarounds to protect systems from being attacked.

    The provided information is insufficient, as Microsoft does not even disclose the versions of Windows that are affected by the security issue. From the looks of it, it seems to affect domain controllers for the most part and not the majority of home computers, as it requires remote authenticated users.

    0Patch, who have analyzed the patch, suggest that the issue affects Windows Server versions predominantly, but that Windows 10 systems and non-DC servers may also be affected if changes have been made to the default configuration:


    UAC (User Account Control) is completely disabled
    PointAndPrint NoWarningNoElevationOnInstall is enabled

    The CVE offers the following description:


    A remote code execution vulnerability exists when the Windows Print Spooler service improperly performs privileged file operations. An attacker who successfully exploited this vulnerability could run arbitrary code with SYSTEM privileges. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.

    An attack must involve an authenticated user calling RpcAddPrinterDriverEx().

    Please ensure that you have applied the security updates released on June 8, 2021, and see the FAQ and Workaround sections in this CVE for information on how to help protect your system from this vulnerability.

    Microsoft provides two suggestions: to disable the Print Spooler service or to disable inbound remote printing using the Group Policy. The first workaround disables printing, local and remote, on the device. It may be a solution on systems on which print functionality is not required, but it is not really an option if printing is done on a device. You may toggle the Print Spooler on demand, but that can become a nuisance quickly.

    The second workaround requires access to the Group Policy, which is only available on Pro and Enterprise versions of Windows.

    Here are both workarounds:

    Workaround for the Windows Print Spooler Remote Code Execution Vulnerability windows-remote-printing-vulnerability.png

    To disable the print spooler, do the following:

    1. Open an elevated PowerShell prompt, e.g. by using Windows-X and selecting Windows PowerShell (Admin).
    2. Run Get-Service -Name Spooler.
    3. Run Stop-Service -Name Spooler -Force
    4. Stop-Service -Name Spooler -Force
    5. Set-Service -Name Spooler -StartupType Disabled

    Command (4) stops the Print Spooler service, command (5) disables it. Note that you won't be able to print anymore when you make the changes (unless you enable the Print Spooler service again.

    Workaround for the Windows Print Spooler Remote Code Execution Vulnerability allow-print-spooler-to-accept-client-connections.png

    To disable inbound remote printing, do the following:

    1. Open Start.
    2. Type gpedit.msc.
    3. Load the Group Policy Editor.
    4. Go to Computer Configuration / Administrative Templates / Printers.
    5. Double-click on Allow Print Spooler to accept client connections.
    6. Set the policy to Disabled.
    7. Select ok.

    0Patch has developed and published a micropatch that fixes the Print Spooler Remote Code Execution issue. The patch has been created for Windows Server only at the time, specifically Windows Server 2008 R2, Windows Server 2021, Windows Server 2016 and Windows Server 2019.

    Thank you for being a Ghacks reader. The post Workaround for the Windows Print Spooler Remote Code Execution Vulnerability appeared first on gHacks Technology News.

    read more...
     
    GHacks, Jul 3, 2021
    #1
  2. Akumos Win User

    Script to restart print spooler

    Hi

    I'm trying to get a script to restart the print spooler on a server from a slient so I don't have to remote in and restart it manually each time. Is this possible?

    I have the restart code, just need to point it to a server.

    Code: @Echo off net stop spooler net start spooler exit[/quote] Any ideas?

    Thanks
     
    Akumos, Jul 3, 2021
    #2
  3. Brink Win User
    Type 1 Font Parsing Remote Code Execution Vulnerability for Windows

    Source: https://portal.msrc.microsoft.com/en...sory/ADV200006
     
    Brink, Jul 3, 2021
    #3
  4. JeremyMQ. Win User

    Workaround for the Windows Print Spooler Remote Code Execution Vulnerability

    CVE-2020-1425 - Microsoft Windows Codec Library remote Code Execution Vulnerability

    CVE-2020-1425 - Microsoft Windows Codec Library remote Code Execution Vulnerability. This is not a patchable vulnerability in Desktop Central. What is required to address this vulnerability?
     
    JeremyMQ., Jul 3, 2021
    #4
Thema:

Workaround for the Windows Print Spooler Remote Code Execution Vulnerability

Loading...
  1. Workaround for the Windows Print Spooler Remote Code Execution Vulnerability - Similar Threads - Workaround Print Spooler

  2. 3D Builder remote code execution vulnerability

    in Windows 10 Gaming
    3D Builder remote code execution vulnerability: Removed all instances including provisioned of 3DBuilder save for one that is listed as "staged" with no package user info other than {S-1-5-18}. Any way of getting rid of this hopefully via powershell? It seems to be triggering a Tenable.io plugin but I'm wondering if it is...
  3. 3D Builder remote code execution vulnerability

    in Windows 10 Software and Apps
    3D Builder remote code execution vulnerability: Removed all instances including provisioned of 3DBuilder save for one that is listed as "staged" with no package user info other than {S-1-5-18}. Any way of getting rid of this hopefully via powershell? It seems to be triggering a Tenable.io plugin but I'm wondering if it is...
  4. 3D Builder remote code execution vulnerability

    in AntiVirus, Firewalls and System Security
    3D Builder remote code execution vulnerability: Removed all instances including provisioned of 3DBuilder save for one that is listed as "staged" with no package user info other than {S-1-5-18}. Any way of getting rid of this hopefully via powershell? It seems to be triggering a Tenable.io plugin but I'm wondering if it is...
  5. Windows Print Spooler Remote Code Execution Vulnerability CVE-2021-34527

    in AntiVirus, Firewalls and System Security
    Windows Print Spooler Remote Code Execution Vulnerability CVE-2021-34527: Do I need to do do/patch something for Windows 10? what? how?Or will this be updated through the standard windows/security updates that install automatically...
  6. Type 1 Font Parsing Remote Code Execution Vulnerability for Windows

    in Windows 10 News
    Type 1 Font Parsing Remote Code Execution Vulnerability for Windows: Microsoft is aware of limited targeted attacks that could leverage un-patched vulnerabilities in the Adobe Type Manager Library, and is providing the following guidance to help reduce customer risk until the security update is released. Two remote code execution...
  7. CVE-2018-8421 - .NET Framework Remote Code Execution Vulnerability

    in Windows 10 News
    CVE-2018-8421 - .NET Framework Remote Code Execution Vulnerability: A remote code execution vulnerability exists when Microsoft .NET Framework processes input. An attacker who successfully exploited this vulnerability could take control of an affected system. To exploit the vulnerability, an attacker would need to be able to upload a...
  8. HP Ink Printers Remote Code Execution Vulnerability

    in Windows 10 News
    HP Ink Printers Remote Code Execution Vulnerability: SUPPORT COMMUNICATION- SECURITY BULLETIN Document ID: c06097712 Version: 2 HPSBHF03589 rev. 2 - HP Ink Printers Remote Code Execution Notice:: The information in this security bulletin should be acted upon as soon as possible. Release date : 01-Aug-2018 Last updated :...
  9. CVE-2018-8245 Microsoft Publisher Remote Code Execution Vulnerability

    in Windows 10 News
    CVE-2018-8245 Microsoft Publisher Remote Code Execution Vulnerability: A remote code execution vulnerability exists when Microsoft Publisher fails to utilize features that lock down the Local Machine zone when instantiating OLE objects. An attacker who successfully exploited the vulnerability could force arbitrary code to be executed in the...
  10. HoloLens Security Update July 11- Remote Code Execution Vulnerability

    in Windows 10 News
    HoloLens Security Update July 11- Remote Code Execution Vulnerability: CVE-2017-8584 | HoloLens Remote Code Execution Vulnerability A remote code execution vulnerability exists when HoloLens improperly handles objects in memory. An attacker who successfully exploited this vulnerability could take control of an affected system. An attacker...