{"id":21402,"date":"2021-09-16T12:36:29","date_gmt":"2021-09-16T10:36:29","guid":{"rendered":"http:\/\/159.69.82.204\/win\/?p=21402"},"modified":"2021-09-17T08:39:32","modified_gmt":"2021-09-17T06:39:32","slug":"patchday-nachlese-sept-2021-neuer-printnightmare-fix","status":"publish","type":"post","link":"https:\/\/borncity.com\/win\/2021\/09\/16\/patchday-nachlese-sept-2021-neuer-printnightmare-fix\/","title":{"rendered":"Patchday Sept. 2021 Review: New PrintNightmare fix, new issues, new desaster?"},"content":{"rendered":"<p><img decoding=\"async\" style=\"float: left; margin: 0px 10px 0px 0px; display: inline;\" title=\"Windows\" src=\"https:\/\/www.borncity.com\/blog\/wp-content\/uploads\/2021\/04\/Windows-klein.jpg\" alt=\"Windows\" width=\"200\" align=\"left\" \/>[<a href=\"https:\/\/www.borncity.com\/blog\/2021\/09\/16\/patchday-nachlese-sept-2021-neuer-printnightmare-fix\/\" target=\"_blank\" rel=\"noopener\">German<\/a>]For months, a number of vulnerabilities in the Windows Print Spooler service, which are summarized under the term PrintNightmare, have existed in all Windows versions. Microsoft has been trying to close the vulnerabilities completely since July 2021 to no avail. New problems occur after every patch. At patchday on September 14, 2021, there was another PrintNightmare fix, but it poses problems again. Here is a brief overview of the state &#8211; we can say: For some users it's a new desaster, because the printer won't work after update.<\/p>\n<p><!--more--><\/p>\n<h2>The PrintNightmare vulnerability<\/h2>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/vg07.met.vgwort.de\/na\/57c69e86465d434181b48a3d2f6cddbe\" alt=\"\" width=\"1\" height=\"1\" \/>In early July 2021, I first reported the vulnerability CVE-2021-1675 in the Windows Print Spooler in the blog post <a href=\"https:\/\/borncity.com\/win\/2021\/07\/01\/poc-fr-windows-print-spooler-schwachstelle-ffentlich-hohes-rce-risiko\/\">PoC for Windows print spooler vulnerability public, high RCE risk<\/a>. It is a remote code execution (RCE) vulnerability that could allow an attacker to execute arbitrary code with SYSTEM privileges. This includes installing programs, viewing, modifying or deleting data, or creating new accounts with full user privileges.<\/p>\n<p>Microsoft has been trying to fix the PrintNightmare vulnerability through updates since early July 2021 (see the list of links at the end of the article). However, these attempts have failed so far, and the PrintNightmare vulnerability has been patched incompletely. In addition, there are other problems after each update, e.g. printer drivers need administrator rights for installation. The list of links at the end of the article summarizes blog posts on the topic. At the end of August 2021, I had summarized the latest status in the blog post <a href=\"https:\/\/borncity.com\/win\/2021\/08\/28\/windows-printnightmare-wrap-up-and-status-august-28-2021\/\">Windows: PrintNightmare wrap-up and status (August 28, 2021)<\/a>.<\/p>\n<h2>September 2021 patches for PrintNightmare<\/h2>\n<p>As of September 14, 2021, Microsoft has also included the PrintNightmare vulnerability in its security updates for Windows, even though this was not explicitly mentioned in the support posts. However, I have received a security advisory from Microsoft regarding this.<\/p>\n<p>CVE-2021-1678<\/p>\n<p>&#8211; Windows Print Spooler Spoofing Vulnerability<br \/>\n&#8211; <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2021-1678\" target=\"_blank\" rel=\"noopener\">CVE-2021-1678<\/a> &#8211; Version 2.0<br \/>\n&#8211; Reason for Revision: CVE updated to announce that Microsoft is releasing the<br \/>\nSeptember 2021 security updates for all affected versions of Windows to address<br \/>\nthis vulnerability. Additionally, other information has been updated, including<br \/>\nthe following: 1) The CVE title and impact have been changed to better reflect<br \/>\nthe vulnerability. 2) FAQs have been added. 3) Acknowledgement has been updated.<br \/>\n&#8211; Originally posted: January 12, 2021<br \/>\n&#8211; Updated: September 14, 2021<\/p>\n<p>CVE-2021-36958<\/p>\n<p>&#8211; Windows Print Spooler Remote Code Execution Vulnerability<br \/>\n&#8211; <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2021-36958\" target=\"_blank\" rel=\"noopener\">CVE-2021-36958<\/a>\u00a0 &#8211; Version 2.0<br \/>\n&#8211; Reason for Revision: CVE updated to announce that Microsoft is releasing the<br \/>\nSeptember 2021 security updates for all affected versions of Windows to address<br \/>\nthis vulnerability. Additionally, other information has been updated, including the<br \/>\nfollowing: 1) Executive Summary has been updated 2) Workarounds have been removed as<br \/>\nthey are no longer applicable 3) FAQs have been updated to reflect the release of the<br \/>\nSeptember 2021 security updates.<br \/>\n&#8211; Originally posted: August 11, 2021<br \/>\n&#8211; Updated: September 14, 2021<\/p>\n<p>Microsoft has released new patches for the two vulnerabilities listed above as of September 14, 2021. The colleagues from Bleeping Computer have given an outline of the information in <a href=\"https:\/\/www.bleepingcomputer.com\/news\/microsoft\/microsoft-fixes-remaining-windows-printnightmare-vulnerabilities\/\" target=\"_blank\" rel=\"noopener\">this article<\/a>. Benjamin Delpi confirms in <a href=\"https:\/\/twitter.com\/gentilkiwi\/status\/1437850150513295369\" target=\"_blank\" rel=\"noopener\">this tweet<\/a> that the vulnerabilities used by his exploits no longer work.<\/p>\n<p><a href=\"https:\/\/twitter.com\/gentilkiwi\/status\/1437850150513295369\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" title=\"PrintNightmare Sept. 2021 patch\" src=\"https:\/\/i.imgur.com\/IX6xuxk.png\" alt=\"PrintNightmare Sept. 2021 patch\" \/><\/a><\/p>\n<p>Delpy told BleepingComputer that Microsoft disabled the CopyFiles feature by default. This could be the explanation why some printer drivers cause problems after the patch. However, there is now an undocumented group policy that administrators can use to re-enable the CopyFiles feature. To do this, the following must be entered in the Windows registry under the key:<\/p>\n<p>HKLM\\Software\\Policies\\Microsoft\\Windows NT\\Printers<\/p>\n<p>a DWORD value CopyFilesPolicy must be added and set to 1, so that CopyFiles is enabled again. According to Delpy, this function can then still only be used with the Microsoft file C:\\Windows\\System32\\mscms.dll.<\/p>\n<h2>Printing issues due to the patch<\/h2>\n<p>Similar to what happened back in August 2021 (see <a href=\"https:\/\/borncity.com\/win\/2021\/08\/28\/windows-printnightmare-wrap-up-and-status-august-28-2021\/\">Windows: PrintNightmare wrap-up and status (August 28, 2021)<\/a>), the new updates also seem to cause printer issues again. German user Andreas <a href=\"https:\/\/www.borncity.com\/blog\/2021\/09\/15\/patchday-windows-10-updates-14-september-2021\/#comment-113535\" target=\"_blank\" rel=\"noopener\">reported within my German blog<\/a> about striking Notbook printers on Apple devices connected with a Windows Server 2019 PrintServer, which is confirmed by other readers. Blog reader Andreas Oberhof writes in <a href=\"https:\/\/www.borncity.com\/blog\/2021\/09\/15\/patchday-windows-10-updates-14-september-2021\/#comment-113549\" target=\"_blank\" rel=\"noopener\">this German comment<\/a> on theGerman\u00a0 article <a href=\"https:\/\/www.borncity.com\/blog\/2021\/09\/15\/patchday-windows-10-updates-14-september-2021\/\" target=\"_blank\" rel=\"noopener\">Patchday: Windows 10-Updates (14. September 2021<\/a>:<\/p>\n<blockquote><p>Printer problem after September update. For shared printers, suddenly the drivers are missing on the clients (win 10, current FU).<br \/>\nPrinting is not possible. Remove printer is not possible. Adding printers is not possible. Interestingly, the problems do not exist on a terminal server in the same environment (also patched). Anyone have any ideas?<\/p><\/blockquote>\n<p>German blog reader Stefan <a href=\"https:\/\/www.borncity.com\/blog\/2021\/09\/15\/patchday-windows-10-updates-14-september-2021\/#comment-113571\" target=\"_blank\" rel=\"noopener\">confirms this problem<\/a> on a terminal server. Blog reader Thomas <a href=\"https:\/\/www.borncity.com\/blog\/2021\/09\/15\/patchday-windows-10-updates-14-september-2021\/#comment-113545\" target=\"_blank\" rel=\"noopener\">describes<\/a> an exotic problem that freezes the PC when debugging a printer driver &#8211; the whole thing is <a href=\"https:\/\/developercommunity.visualstudio.com\/t\/computer-freezes-when-finishing-debugging-after-up\/1528918\" target=\"_blank\" rel=\"noopener\">described here<\/a>. On mewe.com I received the following feedback on the patchday post:<\/p>\n<blockquote><p>&#8230; the far bigger problem is: on our network, test users can now no longer connect printers and need administrative rights to do so. Right click under W10 at the print server under 2016 then wants to get drivers and bang<\/p><\/blockquote>\n<p>On Bleeping Computer's forum there is <a href=\"https:\/\/www.bleepingcomputer.com\/forums\/t\/758380\/installed-kb5005565-today-now-cant-print-to-networked-printers\/\" target=\"_blank\" rel=\"noopener\">this thread<\/a> about printing problems with network printers after installing update KB5005565. And on reddit.com I noticed <a href=\"https:\/\/www.reddit.com\/r\/sysadmin\/comments\/pochxo\/microsoft_fixes_remaining_windows_printnightmare\/\" target=\"_blank\" rel=\"noopener\">this thread<\/a> where users are also confirming printing issues due to the Sept 2021 updates. On reddit.com, <a href=\"https:\/\/www.reddit.com\/r\/windows\/comments\/pomozc\/kb5005613_printer_problem_server_2012_r2\/\" target=\"_blank\" rel=\"noopener\">this thread<\/a> confirms the problem with printers on Windows Server 2012 R2 &#8211; and <a href=\"https:\/\/old.reddit.com\/r\/sysadmin\/comments\/pochxo\/microsoft_fixes_remaining_windows_printnightmare\/\" target=\"_blank\" rel=\"noopener\">this reddit.com<\/a> thread describes the same thing.<\/p>\n<blockquote><p><strong>Addendum:<\/strong> In the meantime, I have received a number of reports from people who can no longer print. This affects all kinds of printers, even Zebra label printers are among them. In July 2021, Microsoft even had to withdraw a patch via KIR (see\u00a0 <a href=\"https:\/\/borncity.com\/win\/2021\/07\/09\/windows-10-microsoft-fixes-zebr-dymo-printer-issues-caused-by-update-e-g-kb5004945-via-kir\/\" rel=\"bookmark noopener noreferrer\" data-wpel-link=\"internal\">Windows 10: Microsoft fixes Zebra &amp; Dymo printer issues caused by update (e.g. KB5004945) via KIR<\/a>).<\/p><\/blockquote>\n<h3>What could help<\/h3>\n<p>In <a href=\"https:\/\/www.borncity.com\/blog\/2021\/08\/28\/windows-printnightmare-nachlese-und-stand-august-2021\/#comment-113572\" target=\"_blank\" rel=\"noopener\">this comment<\/a> to the article <a href=\"https:\/\/www.borncity.com\/blog\/2021\/08\/28\/windows-printnightmare-nachlese-und-stand-august-2021\/\">Windows: PrintNightmare-Nachlese und Stand (27. August 2021)<\/a> Benjamin writes that he succeeded in getting the striking devices to work again with the hints collected in the article (set up V4 drivers on the PrintServer a second time). However, this is likely to fix the problems only in isolated cases.<\/p>\n<p>In the blog post I had also mentioned that you can reset the admin permissions for printer installation introduced by the August 2021 update via GPO. Microsoft has described this in support article <a href=\"https:\/\/support.microsoft.com\/help\/5005652\" target=\"_blank\" rel=\"noopener\">KB5005652<\/a>.<\/p>\n<p><strong>Similar article<\/strong><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2021\/07\/01\/poc-fr-windows-print-spooler-schwachstelle-ffentlich-hohes-rce-risiko\/\">PoC for Windows print spooler vulnerability public, high RCE risk<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2021\/07\/02\/windows-print-spooler-schwachstelle-cve-2021-1675-printnightmare-von-ms-besttigt-cisa-warnt\/\">Windows Print Spooler Vulnerability (CVE-2021-1675, PrintNightmare) Confirmed by MS; CISA Warns<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2021\/07\/03\/0patch-micropatches-fr-printnightmare-schwachstelle-cve-2021-34527\/\">0Patch Micropatches for PrintNightmare Vulnerability (CVE-2021-34527)<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2021\/07\/07\/notfall-update-schliet-printnightmare-schwachstelle-in-windows\/\">Out-of-Band Update closes Windows PrintNightmare Vulnerability (July 6, 2021)<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2021\/07\/08\/printnightmare-out-of-band-update-also-for-windows-server-2012-and-2016-july-7-2021\/\">PrintNightmare out-of-band update also for Windows Server 2012 and 2016 (July 7, 2021)<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2021\/07\/08\/the-chaos-printnightmare-emergency-update-july-6-7-2021\/\">The Chaos PrintNightmare Emergency Update (July 6\/7, 2021)<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2021\/07\/09\/windows-10-microsoft-fixes-zebr-dymo-printer-issues-caused-by-update-e-g-kb5004945-via-kir\/\">Windows 10: Microsoft fixes Zebra &amp; Dymo printer issues caused by update (e.g. KB5004945) via KIR<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2021\/07\/10\/microsoft-zur-printnightmare-schwachstelle-cve-2021-34527-windows-ist-nach-patch-sicher\/\">Microsoft on PrintNightmare vulnerability CVE-2021-34527: Windows is secure after patch<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2021\/07\/14\/patchday-windows-10-updates-july-13-2021\/\">Patchday: Windows 10-Updates (July 13, 2021)<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2021\/07\/14\/patchday-windows-8-1-server-2012-updates-13-juli-2021\/\">Patchday: Windows 8.1\/Server 2012-Updates (July 13, 2021)<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2021\/07\/14\/patchday-updates-fr-windows-7-server-2008-r2-13-juli-2021\/\">Patchday: Updates f\u00fcr Windows 7\/Server 2008 R2 (July 13, 2021)<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2021\/07\/16\/windows-schwachstelle-printnightmare-es-ist-noch-nicht-vorbei-15-juli-2021\/\">Windows vulnerability PrintNightmare: It's not over yet (July 15, 2021)<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2021\/07\/17\/microsoft-defender-for-identity-kann-printnightmare-angriffe-erkennen\/\">Microsoft Defender for Identity can detect PrintNightmare attacks<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2021\/07\/19\/printnightmare-point-and-print-erlaubt-die-installation-beliebiger-dateien\/\">PrintNightmare: Point-and-Print allows installation of arbitrary files<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2021\/08\/06\/0patch-fix-fr-neue-windows-printnightmare-0-day-schwachstelle-5-aug-2021\/\">0patch fix for new Windows PrintNightmare 0-day vulnerability (Aug. 5, 2021)<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2021\/08\/12\/windows-printnightmare-neue-runde-mit-cve-2021-36958\/\">Windows PrintNightmare, next round with CVE-2021-36958<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2021\/08\/12\/ransomware-gang-nutzt-printnightmare-fr-angriffe-auf-windows-server\/\">Ransomware gang uses PrintNightmare to attack Windows servers<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2021\/08\/14\/vice-society-2-ransomware-gang-nutzt-windows-printnightmare-schwachstelle-fr-angriffe\/\">Vice Society: 2. Ransomware gang uses Windows PrintNightmare vulnerability for attacks<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2021\/08\/20\/microsofts-macht-bei-printnightmare-auf-schlanker-fu\/\">Microsoft shows a \"slim foot\" with PrintNightmare<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2021\/08\/28\/windows-printnightmare-wrap-up-and-status-august-28-2021\/\">Windows: PrintNightmare wrap-up and status (August 28, 2021)<\/a><\/p>\n<p><a href=\"https:\/\/borncity.com\/win\/2021\/09\/15\/patchday-windows-10-updates-september-14-2021\/\">Patchday: Windows 10-Updates (September 14, 2021)<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2021\/09\/15\/patchday-windows-8-1-server-2012-updates-14-september-14-2021\/\">Patchday: Windows 8.1\/Server 2012 Updates (September 14, 2021)<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2021\/09\/15\/patchday-updates-fr-windows-7-server-2008-r2-14-september-2021\/\">Patchday: Updates for Windows 7\/Server 2008 R2 (September 14, 2021)<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>[German]For months, a number of vulnerabilities in the Windows Print Spooler service, which are summarized under the term PrintNightmare, have existed in all Windows versions. Microsoft has been trying to close the vulnerabilities completely since July 2021 to no avail. &hellip; <a href=\"https:\/\/borncity.com\/win\/2021\/09\/16\/patchday-nachlese-sept-2021-neuer-printnightmare-fix\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[463,580,22,2],"tags":[2675,2674,2661,466,69,195,194],"class_list":["post-21402","post","type-post","status-publish","format-standard","hentry","category-issue","category-security","category-update","category-windows","tag-drucken","tag-patchday-9-2021","tag-printnightmare","tag-problem","tag-security","tag-update","tag-windows"],"_links":{"self":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/21402","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/comments?post=21402"}],"version-history":[{"count":0,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/21402\/revisions"}],"wp:attachment":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/media?parent=21402"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/categories?post=21402"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/tags?post=21402"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}