{"id":20984,"date":"2021-08-12T10:58:10","date_gmt":"2021-08-12T08:58:10","guid":{"rendered":"http:\/\/159.69.82.204\/win\/?p=20984"},"modified":"2021-08-12T22:19:26","modified_gmt":"2021-08-12T20:19:26","slug":"windows-printnightmare-neue-runde-mit-cve-2021-36958","status":"publish","type":"post","link":"https:\/\/borncity.com\/win\/2021\/08\/12\/windows-printnightmare-neue-runde-mit-cve-2021-36958\/","title":{"rendered":"Windows PrintNightmare, next round with CVE-2021-36958"},"content":{"rendered":"<p><img decoding=\"async\" style=\"float: left; margin: 0px 10px 0px 0px; display: inline;\" title=\"Windows\" src=\"https:\/\/www.borncity.com\/blog\/wp-content\/uploads\/2021\/04\/Windows-klein.jpg\" alt=\"Windows\" width=\"200\" align=\"left\" \/>[<a href=\"https:\/\/www.borncity.com\/blog\/2021\/08\/12\/windows-printnightmare-neue-runde-mit-cve-2021-36958\/\" target=\"_blank\" rel=\"noopener\">German<\/a>]Another small addendum from the August 2021 patchday regarding the PrintNightmare print spooler service vulnerability. Microsoft did release a patch that is supposed to fix the vulnerability. But I had already pointed out in my Patchday blog posts that this patch was not sufficient. Now Microsoft has set a new CVE-2021-36958 (Windows Print Spooler Remote Code Execution Vulnerability) as of 8\/11\/2021.<\/p>\n<p><!--more--><\/p>\n<h2>The Windows PrintNightmare Vulnerability<\/h2>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/vg02.met.vgwort.de\/na\/4c2b43b31e384b5f8f792b31cbf6a5ce\" alt=\"\" width=\"1\" height=\"1\" \/>A vulnerability in the Windows Print Spooler service has been known since July 2021, allowing remote code execution (RCE) and possibly privilege escalation. Microsoft has been trying to fix this vulnerability, now named PrintNightmare, through updates since the beginning of July 2021 (see the list of links at the end of the article). But after each patch, security researchers prove that the PrintNightmare vulnerability was incompletely patched. In particular, the function called Point-and-Print, which allows users to install printer drivers, can be abused for attacks.<\/p>\n<h2>Updates for August 2021 don't help<\/h2>\n<p>As of August 10, 2021, Microsoft has released several security updates for the still-supported versions of Windows, including the following fix:<\/p>\n<blockquote><p>Changes the default privilege requirement for installing drivers when using Point and Print. After installing this update, you must have administrative privileges to install drivers. If you use Point and Print, see <a href=\"https:\/\/support.microsoft.com\/topic\/873642bf-2634-49c5-a23b-6d8e9a302872\" target=\"_blank\" rel=\"noopener\">KB5005652<\/a>, <a href=\"https:\/\/aka.ms\/PointPrintMSRCBlog\" target=\"_blank\" rel=\"noopener\">Point and Print Default Behavior Change<\/a>, and <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2021-34481\" target=\"_blank\" rel=\"noopener\">CVE-2021-34481<\/a> for more information.<\/p><\/blockquote>\n<p>As of August 10, 2021, there was also the MSRT blog post <a href=\"https:\/\/msrc-blog.microsoft.com\/2021\/08\/10\/point-and-print-default-behavior-change\/\" target=\"_blank\" rel=\"noopener\">Point and Print Default Behavior Change<\/a> on the topic as well as a support post <a href=\"https:\/\/support.microsoft.com\/help\/5005652\" target=\"_blank\" rel=\"noopener\">KB5005652<\/a> on Point-and-Print, with help for administrators. However, I had already pointed out in the blog posts linked below that the point-and-print vulnerability is probably not fully patched.<\/p>\n<p><a href=\"https:\/\/borncity.com\/win\/2021\/08\/11\/patchday-windows-10-updates-august-10-2021\/\">Patchday: Windows 10-Updates (August 10, 2021)<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2021\/08\/11\/patchday-updates-fr-windows-7-server-2008-r2-10-august-2021\/\">Patchday: Updates for Windows 7\/Server 2008 R2 (August 10, 2021)<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2021\/08\/11\/patchday-windows-8-1-server-2012-updates-10-august-2021\/\">Patchday: Windows 8.1\/Server 2012-Updates (August 10, 2021)<\/a><\/p>\n<h2>Doubts from security researchers<\/h2>\n<p>Because security researcher Benjamin Delpy already pointed out in the following <a href=\"https:\/\/twitter.com\/gentilkiwi\/status\/1425185541142814720\" target=\"_blank\" rel=\"noopener\">tweet<\/a> that he can run his exploit in a virtual machine with a patched Windows 365 installation with standard user rights.<\/p>\n<p><a href=\"https:\/\/twitter.com\/gentilkiwi\/status\/1425185541142814720\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" title=\"PrintNightmare not fixed\" src=\"https:\/\/i.imgur.com\/MSQo2VX.png\" alt=\"PrintNightmare not fixed\" \/><\/a><\/p>\n<p>Files are then reloaded from his public network printer. The only action he had to take was to disable Defender (which can detect an attack via this vulnerability).<\/p>\n<p><a href=\"https:\/\/twitter.com\/wdormann\/status\/1425554450454822912\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" title=\"PrintNightmare not fixed\" src=\"https:\/\/i.imgur.com\/LiOIMvB.png\" alt=\"PrintNightmare not fixed\" \/><\/a><\/p>\n<p>Security researcher Will Dormann writes in the above <a href=\"https:\/\/twitter.com\/wdormann\/status\/1425554450454822912\" target=\"_blank\" rel=\"noopener\">Tweet<\/a>, that he now requires administrator privileges for his proof-of-concept (PoC) for the CVE-2021-36936 vulnerability. He then references the tweet from Delpy, who was able to gain SYSTEM privileges from a standard account.<\/p>\n<p>German blog reader Jonas describes in a <a href=\"https:\/\/www.borncity.com\/blog\/2021\/08\/11\/patchday-windows-10-updates-10-august-2021\/#comment-111946\" target=\"_blank\" rel=\"noopener\">comment<\/a> to my German blog post that installing new drivers or to update a printer driver requires administrator privileges.<\/p>\n<blockquote><p>By default, users without administrator privileges will not be able to perform the following point-and-print steps:<\/p>\n<p>-Installing new printers using drivers on a remote computer or server.<\/p>\n<p>&#8211; Update existing printer drivers using drivers from a remote computer or server.<\/p><\/blockquote>\n<p>The source cited is support article <a href=\"https:\/\/support.microsoft.com\/help\/5005652\" target=\"_blank\" rel=\"noopener\">KB5005652<\/a> on point-and-print. This leads to a discussion here on the blog, where blog readers like <a href=\"https:\/\/www.borncity.com\/blog\/2021\/08\/11\/patchday-windows-10-updates-10-august-2021\/#comment-111955\" target=\"_blank\" rel=\"noopener\">Zanza<\/a> report their own experiences. He writes that he could connect to new printers from the print server even if the affected driver already exists locally. On Twitter I <a href=\"https:\/\/twitter.com\/wdormann\/status\/1425225951726669830\" target=\"_blank\" rel=\"noopener\">read a message<\/a> that files would be reloaded from the remote print server if necessary. I can't test anything here, but overall it's probably a pretty unsatisfactory situation.<\/p>\n<p>Kevin Beaumont has published the simple <em>SystemNightmare.bat<\/em> on <a href=\"https:\/\/github.com\/GossiTheDog\/SystemNightmare\" target=\"_blank\" rel=\"noopener\">GitHub<\/a> to give you instant SYSTEM command prompt on all supported and legacy versions of Windows.<\/p>\n<p><a href=\"https:\/\/twitter.com\/gentilkiwi\/status\/1425875881680068608\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" src=\"https:\/\/i.imgur.com\/zwmF1kw.png\" alt=\"PrintNightmare mitigation\" \/><\/a><\/p>\n<p>Benjamin Deply has linked his <a href=\"https:\/\/github.com\/gentilkiwi\/mimikatz\/tree\/master\/mimispool#protect\" target=\"_blank\" rel=\"noopener\">GitHub page<\/a> within the above <a href=\"https:\/\/twitter.com\/gentilkiwi\/status\/1425875881680068608\" target=\"_blank\" rel=\"noopener\">tweet<\/a>. There he gives advice on how to mitigate this attack vector through registry entries, etc.<\/p>\n<h2>Microsoft released CVE-2021-36958<\/h2>\n<p>Will Dormann's <a href=\"https:\/\/twitter.com\/wdormann\/status\/1425554450454822912\" target=\"_blank\" rel=\"noopener\">tweeted<\/a> that Microsoft has published a new <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2021-36958\" target=\"_blank\" rel=\"noopener\">CVE-2021-36958<\/a> (Windows Print Spooler Remote Code Execution Vulnerability) as of August 11, 2021. It states:<\/p>\n<blockquote><p>A remote code execution vulnerability exists when the Windows Print Spooler service improperly performs privileged file operations. An attacker who successfully exploited this vulnerability could run arbitrary code with SYSTEM privileges. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.<\/p>\n<p>The workaround for this vulnerability is stopping and disabling the Print Spooler service.<\/p><\/blockquote>\n<p>Currently, the vulnerability is not exploited yet. Microsoft has once again dug out the old workaround, and recommends stopping and disabling the print spooler service. So PrintNightmare is not over yet &#8211; and the animated GIF shown in <a href=\"https:\/\/twitter.com\/the_drenrepus\/status\/1425188859059580932\" target=\"_blank\" rel=\"noopener\">this tweet<\/a> sums up Microsoft's patch attempts.<\/p>\n<p><strong>Similar article<\/strong><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2021\/07\/01\/poc-fr-windows-print-spooler-schwachstelle-ffentlich-hohes-rce-risiko\/\">PoC for Windows print spooler vulnerability public, high RCE risk<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2021\/07\/02\/windows-print-spooler-schwachstelle-cve-2021-1675-printnightmare-von-ms-besttigt-cisa-warnt\/\">Windows Print Spooler Vulnerability (CVE-2021-1675, PrintNightmare) Confirmed by MS; CISA Warns<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2021\/07\/03\/0patch-micropatches-fr-printnightmare-schwachstelle-cve-2021-34527\/\">0Patch Micropatches for PrintNightmare Vulnerability (CVE-2021-34527)<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2021\/07\/07\/notfall-update-schliet-printnightmare-schwachstelle-in-windows\/\">Out-of-Band Update closes Windows PrintNightmare Vulnerability (July 6, 2021)<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2021\/07\/08\/printnightmare-out-of-band-update-also-for-windows-server-2012-and-2016-july-7-2021\/\">PrintNightmare out-of-band update also for Windows Server 2012 and 2016 (July 7, 2021)<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2021\/07\/08\/the-chaos-printnightmare-emergency-update-july-6-7-2021\/\">The Chaos PrintNightmare Emergency Update (July 6\/7, 2021)<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2021\/07\/09\/windows-10-microsoft-fixes-zebr-dymo-printer-issues-caused-by-update-e-g-kb5004945-via-kir\/\">Windows 10: Microsoft fixes Zebra &amp; Dymo printer issues caused by update (e.g. KB5004945) via KIR<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2021\/07\/10\/microsoft-zur-printnightmare-schwachstelle-cve-2021-34527-windows-ist-nach-patch-sicher\/\">Microsoft on PrintNightmare vulnerability CVE-2021-34527: Windows is secure after patch<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2021\/07\/14\/patchday-windows-10-updates-july-13-2021\/\">Patchday: Windows 10-Updates (July 13, 2021)<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2021\/07\/14\/patchday-windows-8-1-server-2012-updates-13-juli-2021\/\">Patchday: Windows 8.1\/Server 2012-Updates (July 13, 2021)<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2021\/07\/14\/patchday-updates-fr-windows-7-server-2008-r2-13-juli-2021\/\">Patchday: Updates f\u00fcr Windows 7\/Server 2008 R2 (July 13, 2021)<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2021\/07\/16\/windows-schwachstelle-printnightmare-es-ist-noch-nicht-vorbei-15-juli-2021\/\">Windows vulnerability PrintNightmare: It's not over yet (July 15, 2021)<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2021\/07\/17\/microsoft-defender-for-identity-kann-printnightmare-angriffe-erkennen\/\">Microsoft Defender for Identity can detect PrintNightmare attacks<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2021\/07\/19\/printnightmare-point-and-print-erlaubt-die-installation-beliebiger-dateien\/\">PrintNightmare: Point-and-Print allows installation of arbitrary files<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2021\/08\/06\/0patch-fix-fr-neue-windows-printnightmare-0-day-schwachstelle-5-aug-2021\/\">0patch fix for new Windows PrintNightmare 0-day vulnerability (Aug. 5, 2021)<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>[German]Another small addendum from the August 2021 patchday regarding the PrintNightmare print spooler service vulnerability. Microsoft did release a patch that is supposed to fix the vulnerability. But I had already pointed out in my Patchday blog posts that this &hellip; <a href=\"https:\/\/borncity.com\/win\/2021\/08\/12\/windows-printnightmare-neue-runde-mit-cve-2021-36958\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[580,2],"tags":[2661,69,194],"class_list":["post-20984","post","type-post","status-publish","format-standard","hentry","category-security","category-windows","tag-printnightmare","tag-security","tag-windows"],"_links":{"self":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/20984","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/comments?post=20984"}],"version-history":[{"count":0,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/20984\/revisions"}],"wp:attachment":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/media?parent=20984"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/categories?post=20984"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/tags?post=20984"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}