{"id":21432,"date":"2021-09-18T19:20:23","date_gmt":"2021-09-18T17:20:23","guid":{"rendered":"http:\/\/159.69.82.204\/win\/?p=21432"},"modified":"2021-09-18T19:20:23","modified_gmt":"2021-09-18T17:20:23","slug":"windows-printnightmare-microsoft-besttigt-probleme-nach-sept-2021-update","status":"publish","type":"post","link":"https:\/\/borncity.com\/win\/2021\/09\/18\/windows-printnightmare-microsoft-besttigt-probleme-nach-sept-2021-update\/","title":{"rendered":"Windows PrintNightmare: Microsoft confirms printing problems after Sept. 2021 update"},"content":{"rendered":"<p><img decoding=\"async\" title=\"Windows\" style=\"float: left; margin: 0px 10px 0px 0px; display: inline\" alt=\"Windows\" src=\"https:\/\/www.borncity.com\/blog\/wp-content\/uploads\/2021\/04\/Windows-klein.jpg\" width=\"200\" align=\"left\">[<a href=\"https:\/\/www.borncity.com\/blog\/2021\/09\/18\/windows-printnightmare-microsoft-besttigt-probleme-nach-sept-2021-update\/\" target=\"_blank\" rel=\"noopener\">German<\/a>]For months, a number of vulnerabilities in the Windows Print Spooler service have existed in all versions of Windows, collectively known as PrintNightmare. Microsoft has been trying in vain to close the vulnerabilities completely since July 2021, but is having problems. The updates released for patchday on September 14, 2021 also cause problems, which Microsoft has now partially acknowledged. There is the advice to update the printer driver to be able to print again.<\/p>\n<p><!--more--><\/p>\n<h2>The PrintNightmare vulnerabilities<\/h2>\n<p><img loading=\"lazy\" decoding=\"async\" alt=\"\" src=\"https:\/\/vg07.met.vgwort.de\/na\/9bb523a911fa4a0b90e89b73dd18bcb2\" width=\"1\" height=\"1\">Since early July 2021, vulnerabilities in the Windows Print Spooler have been public, allowing remote code execution (RCE) (see<a href=\"https:\/\/borncity.com\/win\/2021\/07\/01\/poc-fr-windows-print-spooler-schwachstelle-ffentlich-hohes-rce-risiko\/\">PoC for Windows print spooler vulnerability public, high RCE risk<\/a>). An attacker could execute arbitrary code with SYSTEM privileges. This includes installing programs, viewing, modifying or deleting data, or creating new accounts with full user privileges.<\/p>\n<p>As of patchday on September 14, 2021, there was another PrintNightmare fix, but it poses problems again. For example, printers on terminal servers or print servers can no longer print. I had already reported about the issue in the blog post <a href=\"https:\/\/borncity.com\/win\/2021\/09\/16\/patchday-nachlese-sept-2021-neuer-printnightmare-fix\/\">Patchday Sept. 2021 Review: New PrintNightmare fix, new issues, new desaster?<\/a> <\/p>\n<h2>Microsoft confirms the issues<\/h2>\n<p>As of September 17, 2021, Microsoft then acknowledged problems with printing in the <a href=\"https:\/\/docs.microsoft.com\/en-us\/windows\/release-health\/status-windows-10-21H1\" target=\"_blank\" rel=\"noopener\">Windows 10 status area<\/a> in the known issues section. The entry <a href=\"https:\/\/docs.microsoft.com\/en-us\/windows\/release-health\/status-windows-10-21H1#1692msgdesc\" target=\"_blank\" rel=\"noopener\">Administrator credentials required every time apps attempt to print<\/a> addresses the issue that the printer installation requires administrator credentials when printing. It states:<\/p>\n<blockquote>\n<p>After installing <a href=\"https:\/\/support.microsoft.com\/help\/5005033\" target=\"_blank\" rel=\"noopener\">KB5005033<\/a>&nbsp; or a subsequent update, certain printers in some environments that use Point and Print may display the \"Trust this printer\" prompt. In addition, when an application attempts to print to a print server or a print client connects to a print server, administrator credentials are required for installation.<\/p>\n<p>This is caused by a printer driver on the print client and the print server using the same file name, but the server has a newer version of the file. When the print client connects to the print server, it finds a newer driver file and is prompted to update the drivers on the print client, but the file in the package it is offered for installation does not contain the newer file version.<\/p>\n<\/blockquote>\n<p>The following Windows clients and server variants are affected by this behavior &#8211; that is, all Windows versions that are still supported. <\/p>\n<ul>\n<li>Client: Windows 10, version 21H1; Windows 10, version 20H2; Windows 10, version 2004; Windows 10, version 1909; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607; Windows 10 Enterprise 2015 LTSB; Windows 8.1; Windows 7 SP1\n<li>Server: Windows Server 2022; Windows Server, version 20H2; Windows Server, version 2004; Windows Server, version 1909; Windows Server, version 1809; Windows Server 2019; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2.<\/li>\n<\/ul>\n<p>Microsoft's \"workaround\" is to make sure the latest drivers are used for all printing devices. Also, if possible, the same version of the printer driver should be used on the print client and the print server. So, this problem should be solved externally by the administrator by adjusting the printer drivers in the environment. If updating the drivers does not solve the problem, you should contact the support of your printer manufacturer (OEM) (see also the FAQ in <a href=\"https:\/\/support.microsoft.com\/help\/5005652\" target=\"_blank\" rel=\"noopener\">KB5005652<\/a>).<\/p>\n<p><strong>Similar article<\/strong><br \/><a href=\"https:\/\/borncity.com\/win\/2021\/07\/01\/poc-fr-windows-print-spooler-schwachstelle-ffentlich-hohes-rce-risiko\/\">PoC for Windows print spooler vulnerability public, high RCE risk<\/a><br \/><a href=\"https:\/\/borncity.com\/win\/2021\/07\/02\/windows-print-spooler-schwachstelle-cve-2021-1675-printnightmare-von-ms-besttigt-cisa-warnt\/\">Windows Print Spooler Vulnerability (CVE-2021-1675, PrintNightmare) Confirmed by MS; CISA Warns<\/a><br \/><a href=\"https:\/\/borncity.com\/win\/2021\/07\/03\/0patch-micropatches-fr-printnightmare-schwachstelle-cve-2021-34527\/\">0Patch Micropatches for PrintNightmare Vulnerability (CVE-2021-34527)<\/a><br \/><a href=\"https:\/\/borncity.com\/win\/2021\/07\/07\/notfall-update-schliet-printnightmare-schwachstelle-in-windows\/\">Out-of-Band Update closes Windows PrintNightmare Vulnerability (July 6, 2021)<\/a><br \/><a href=\"https:\/\/borncity.com\/win\/2021\/07\/08\/printnightmare-out-of-band-update-also-for-windows-server-2012-and-2016-july-7-2021\/\">PrintNightmare out-of-band update also for Windows Server 2012 and 2016 (July 7, 2021)<\/a><br \/><a href=\"https:\/\/borncity.com\/win\/2021\/07\/08\/the-chaos-printnightmare-emergency-update-july-6-7-2021\/\">The Chaos PrintNightmare Emergency Update (July 6\/7, 2021)<\/a><br \/><a href=\"https:\/\/borncity.com\/win\/2021\/07\/09\/windows-10-microsoft-fixes-zebr-dymo-printer-issues-caused-by-update-e-g-kb5004945-via-kir\/\">Windows 10: Microsoft fixes Zebra &amp; Dymo printer issues caused by update (e.g. KB5004945) via KIR<\/a><br \/><a href=\"https:\/\/borncity.com\/win\/2021\/07\/10\/microsoft-zur-printnightmare-schwachstelle-cve-2021-34527-windows-ist-nach-patch-sicher\/\">Microsoft on PrintNightmare vulnerability CVE-2021-34527: Windows is secure after patch<\/a><br \/><a href=\"https:\/\/borncity.com\/win\/2021\/07\/14\/patchday-windows-10-updates-july-13-2021\/\">Patchday: Windows 10-Updates (July 13, 2021)<\/a><br \/><a href=\"https:\/\/borncity.com\/win\/2021\/07\/14\/patchday-windows-8-1-server-2012-updates-13-juli-2021\/\">Patchday: Windows 8.1\/Server 2012-Updates (July 13, 2021)<\/a><br \/><a href=\"https:\/\/borncity.com\/win\/2021\/07\/14\/patchday-updates-fr-windows-7-server-2008-r2-13-juli-2021\/\">Patchday: Updates f\u00fcr Windows 7\/Server 2008 R2 (July 13, 2021)<\/a><br \/><a href=\"https:\/\/borncity.com\/win\/2021\/07\/16\/windows-schwachstelle-printnightmare-es-ist-noch-nicht-vorbei-15-juli-2021\/\">Windows vulnerability PrintNightmare: It's not over yet (July 15, 2021)<\/a><br \/><a href=\"https:\/\/borncity.com\/win\/2021\/07\/17\/microsoft-defender-for-identity-kann-printnightmare-angriffe-erkennen\/\">Microsoft Defender for Identity can detect PrintNightmare attacks<\/a><br \/><a href=\"https:\/\/borncity.com\/win\/2021\/07\/19\/printnightmare-point-and-print-erlaubt-die-installation-beliebiger-dateien\/\">PrintNightmare: Point-and-Print allows installation of arbitrary files<\/a><br \/><a href=\"https:\/\/borncity.com\/win\/2021\/08\/06\/0patch-fix-fr-neue-windows-printnightmare-0-day-schwachstelle-5-aug-2021\/\">0patch fix for new Windows PrintNightmare 0-day vulnerability (Aug. 5, 2021)<\/a><br \/><a href=\"https:\/\/borncity.com\/win\/2021\/08\/12\/windows-printnightmare-neue-runde-mit-cve-2021-36958\/\">Windows PrintNightmare, next round with CVE-2021-36958<\/a><br \/><a href=\"https:\/\/borncity.com\/win\/2021\/08\/12\/ransomware-gang-nutzt-printnightmare-fr-angriffe-auf-windows-server\/\">Ransomware gang uses PrintNightmare to attack Windows servers<\/a><br \/><a href=\"https:\/\/borncity.com\/win\/2021\/08\/14\/vice-society-2-ransomware-gang-nutzt-windows-printnightmare-schwachstelle-fr-angriffe\/\">Vice Society: 2. Ransomware gang uses Windows PrintNightmare vulnerability for attacks<\/a><br \/><a href=\"https:\/\/borncity.com\/win\/2021\/08\/20\/microsofts-macht-bei-printnightmare-auf-schlanker-fu\/\">Microsoft shows a \"slim foot\" with PrintNightmare<\/a><br \/><a href=\"https:\/\/borncity.com\/win\/2021\/08\/28\/windows-printnightmare-wrap-up-and-status-august-28-2021\/\">Windows: PrintNightmare wrap-up and status (August 28, 2021)<\/a><br \/><a href=\"https:\/\/borncity.com\/win\/2021\/09\/16\/patchday-nachlese-sept-2021-neuer-printnightmare-fix\/\">Patchday Sept. 2021 Review: New PrintNightmare fix, new issues, new desaster?<\/a> <\/p>\n<p><a href=\"https:\/\/borncity.com\/win\/2021\/09\/15\/patchday-windows-10-updates-september-14-2021\/\">Patchday: Windows 10-Updates (September 14, 2021)<\/a><br \/><a href=\"https:\/\/borncity.com\/win\/2021\/09\/15\/patchday-windows-8-1-server-2012-updates-14-september-14-2021\/\">Patchday: Windows 8.1\/Server 2012 Updates (September 14, 2021)<\/a><br \/><a href=\"https:\/\/borncity.com\/win\/2021\/09\/15\/patchday-updates-fr-windows-7-server-2008-r2-14-september-2021\/\">Patchday: Updates for Windows 7\/Server 2008 R2 (September 14, 2021)<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>[German]For months, a number of vulnerabilities in the Windows Print Spooler service have existed in all versions of Windows, collectively known as PrintNightmare. Microsoft has been trying in vain to close the vulnerabilities completely since July 2021, but is having &hellip; <a href=\"https:\/\/borncity.com\/win\/2021\/09\/18\/windows-printnightmare-microsoft-besttigt-probleme-nach-sept-2021-update\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[463,22,2],"tags":[47,2674,195,194],"class_list":["post-21432","post","type-post","status-publish","format-standard","hentry","category-issue","category-update","category-windows","tag-issue","tag-patchday-9-2021","tag-update","tag-windows"],"_links":{"self":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/21432","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/comments?post=21432"}],"version-history":[{"count":0,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/21432\/revisions"}],"wp:attachment":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/media?parent=21432"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/categories?post=21432"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/tags?post=21432"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}