{"id":20600,"date":"2021-07-10T00:02:00","date_gmt":"2021-07-09T22:02:00","guid":{"rendered":"http:\/\/159.69.82.204\/win\/?p=20600"},"modified":"2021-07-09T18:43:52","modified_gmt":"2021-07-09T16:43:52","slug":"microsoft-zur-printnightmare-schwachstelle-cve-2021-34527-windows-ist-nach-patch-sicher","status":"publish","type":"post","link":"https:\/\/borncity.com\/win\/2021\/07\/10\/microsoft-zur-printnightmare-schwachstelle-cve-2021-34527-windows-ist-nach-patch-sicher\/","title":{"rendered":"Microsoft on PrintNightmare vulnerability CVE-2021-34527: Windows is secure after patch"},"content":{"rendered":"<p><img decoding=\"async\" title=\"Windows\" style=\"float: left; margin: 0px 10px 0px 0px; display: inline\" alt=\"Windows\" src=\"https:\/\/www.borncity.com\/blog\/wp-content\/uploads\/2021\/04\/Windows-klein.jpg\" width=\"200\" align=\"left\">[<a href=\"https:\/\/www.borncity.com\/blog\/?p=255547\" target=\"_blank\" rel=\"noopener\">German<\/a>]Microsoft has commented on reports that the unscheduled updates to close the PrintNightmare vulnerability CVE-2021-34527 in the Windows Print Spooler service would not eliminate all risks. The message is that if the special updates are installed and Windows is configured and operated properly, there is no known scenario that would allow exploitation of the vulnerabilities. As a follow-up, here is an overview of this issue. <\/p>\n<p><!--more--><\/p>\n<h2>The PrintNightmare vulnerabilities<\/h2>\n<p><img loading=\"lazy\" decoding=\"async\" alt=\"\" src=\"https:\/\/vg04.met.vgwort.de\/na\/41e6fb135c674615a3c54591f8f15524\" width=\"1\" height=\"1\">There were various vulnerabilities in the Windows Print Spooler service that were supposed to be closed with the regular June 2021 security updates (see <a href=\"https:\/\/borncity.com\/win\/2021\/06\/09\/patchday-windows-10-updates-june-8-2021\/\">Patchday: Windows 10-Updates (June 8, 2021)<\/a>). However, at the end of June 2021, it turned out that the June 8, 2021 security updates didn't really work. There was a new vulnerability (CVE-2021-1675) in the Windows Print Spooler service that allowed remote code execution (RCE). These vulnerabilities allow attackers to execute arbitrary code with SYSTEM privileges. Through an unintentionally published proof of concept (PoC), there have already been initial attacks against the vulnerability.<\/p>\n<p>I had reported early on the vulnerability in the blog post <a href=\"https:\/\/borncity.com\/win\/2021\/07\/01\/poc-fr-windows-print-spooler-schwachstelle-ffentlich-hohes-rce-risiko\/\">PoC for Windows print spooler vulnerability public, high RCE risk<\/a>. As of July 6 and 7, 2021, Microsoft then released unscheduled updates for the supported versions of Windows (see article links at the end of the post). However, there were several problems with the updates for the various Windows versions. Once there were indications that the patch was ineffective because the fixes could be bypassed. In addition, collateral damage occurred during the update installation, which I read about in the blog post <a href=\"https:\/\/borncity.com\/win\/2021\/07\/08\/the-chaos-printnightmare-emergency-update-july-6-7-2021\/\">The Chaos PrintNightmare Emergency Update (July 6\/7, 2021)<\/a>. The issue with some label printers were then fixed for Windows 10 version 2004 and later by Microsoft (see <a href=\"https:\/\/borncity.com\/win\/2021\/07\/09\/windows-10-microsoft-fixes-zebr-dymo-printer-issues-caused-by-update-e-g-kb5004945-via-kir\/\">Windows 10: Microsoft fixes Zebra &amp; Dymo printer issues caused by update (e.g. KB5004945) via KIR<\/a>).<\/p>\n<h2>Microsoft comments on security<\/h2>\n<p>Due to discussions that the updates would not fully fix the vulnerabilities in the Windows Print Spooler service, Microsoft then spoke out in a <a href=\"https:\/\/msrc-blog.microsoft.com\/2021\/07\/08\/clarified-guidance-for-cve-2021-34527-windows-print-spooler-vulnerability\/\" target=\"_blank\" rel=\"noopener\">separate blog post<\/a> on July 8, 2021. The following <a href=\"https:\/\/twitter.com\/msftsecresponse\/status\/1413302865569845250\" target=\"_blank\" rel=\"noopener\">tweet<\/a> points to this article.<\/p>\n<p>&nbsp;<a href=\"https:\/\/twitter.com\/msftsecresponse\/status\/1413302865569845250\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" title=\"Hinweis zur PrintNightmare-Schwachstelle\" alt=\"Hinweis zur PrintNightmare-Schwachstelle\" src=\"https:\/\/i.imgur.com\/9jYVRiJ.png\"><\/a><\/p>\n<p>Microsoft explicitly refers to the discussions after the out-of-band (OOB) updates to close the vulnerabilities and addresses the suspicion that the updates still leave vulnerabilities open. To that end, Microsoft writes that all research has shown that the OOB security update works as intended. It is effective against the known printer spooling exploits and other public reports grouped under the name PrintNightmare. <\/p>\n<p>All of the reports questioning its effectiveness that Microsoft investigated were based on changing the default registry setting related to Point and Print, which then lead to an insecure configuration of the system. In the article, Microsoft states that the patches do not cause any changes to Point and Print registry settings. Administrators should therefore review the following registry settings. In the key:<\/p>\n<p>HKEY_LOCAL_MACHINE\\SOFTWARE\\Policies\\Microsoft\\Windows NT\\Printers\\PointAndPrint<\/p>\n<p>the 32-bit DWORD values NoWarningNoElevationOnInstall = 0 and UpdatePromptSettings = 0 must be set to ensure safe default operation. This is the same if the key or DWORD values are missing. If the values are present and not set to 0, the default configuration has been changed and the system is insecure. <\/p>\n<p><strong>Similar articles:<br \/><\/strong><a href=\"https:\/\/borncity.com\/win\/2021\/06\/09\/patchday-windows-10-updates-june-8-2021\/\">Patchday: Windows 10-Updates (June 8, 2021)<\/a><br \/><a href=\"https:\/\/borncity.com\/win\/2021\/07\/01\/poc-fr-windows-print-spooler-schwachstelle-ffentlich-hohes-rce-risiko\/\">PoC for Windows print spooler vulnerability public, high RCE risk<\/a><br \/><a href=\"https:\/\/borncity.com\/win\/2021\/07\/02\/windows-print-spooler-schwachstelle-cve-2021-1675-printnightmare-von-ms-besttigt-cisa-warnt\/\">Windows Print Spooler Vulnerability (CVE-2021-1675, PrintNightmare) Confirmed by MS; CISA Warns<\/a><br \/><a href=\"https:\/\/borncity.com\/win\/2021\/07\/03\/0patch-micropatches-fr-printnightmare-schwachstelle-cve-2021-34527\/\">0Patch Micropatches for PrintNightmare Vulnerability (CVE-2021-34527)<\/a><br \/><a href=\"https:\/\/borncity.com\/win\/2021\/07\/07\/notfall-update-schliet-printnightmare-schwachstelle-in-windows\/\">Out-of-Band Update closes Windows PrintNightmare Vulnerability (July 6, 2021)<\/a><br \/><a href=\"https:\/\/borncity.com\/win\/2021\/07\/08\/printnightmare-out-of-band-update-also-for-windows-server-2012-and-2016-july-7-2021\/\">PrintNightmare out-of-band update also for Windows Server 2012 and 2016 (July 7, 2021)<\/a><br \/><a href=\"https:\/\/borncity.com\/win\/2021\/07\/08\/the-chaos-printnightmare-emergency-update-july-6-7-2021\/\">The Chaos PrintNightmare Emergency Update (July 6\/7, 2021)<\/a><br \/><a href=\"https:\/\/borncity.com\/win\/2021\/07\/09\/windows-10-microsoft-fixes-zebr-dymo-printer-issues-caused-by-update-e-g-kb5004945-via-kir\/\">Windows 10: Microsoft fixes Zebra &amp; Dymo printer issues caused by update (e.g. KB5004945) via KIR<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>[German]Microsoft has commented on reports that the unscheduled updates to close the PrintNightmare vulnerability CVE-2021-34527 in the Windows Print Spooler service would not eliminate all risks. The message is that if the special updates are installed and Windows is configured &hellip; <a href=\"https:\/\/borncity.com\/win\/2021\/07\/10\/microsoft-zur-printnightmare-schwachstelle-cve-2021-34527-windows-ist-nach-patch-sicher\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[580,22,2],"tags":[69,195,194],"class_list":["post-20600","post","type-post","status-publish","format-standard","hentry","category-security","category-update","category-windows","tag-security","tag-update","tag-windows"],"_links":{"self":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/20600","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/comments?post=20600"}],"version-history":[{"count":0,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/20600\/revisions"}],"wp:attachment":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/media?parent=20600"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/categories?post=20600"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/tags?post=20600"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}