Recently, a new vulnerability called “PrintNightmare” is found on Windows systems. Microsoft warns users of all Windows versions to pay attention to this vulnerability since it is being frequently exploited by hackers to attack their systems. What’s the root cause for PrintNightmare? How should you respond to this vulnerability?

The New Vulnerability “PrintNightmare” – CVE-2021-34527

Recently, a new remote code execution vulnerability is found in Windows, causing a stir among Microsoft and multiple other entities. The vulnerability is dubbed “PrintNightmare” and Microsoft labels it as CVE-2021-34527 in its post on the company’s Security Update Guide. The PrintNightmare vulnerability gives attackers a chance to hack into Windows computers and execute code on these machines remotely.

A Serious Vulnerability Was Found In The Windows Task Scheduler.

What Causes PrintNightmare Vulnerability

Hackers are actively exploiting the PrintNightmare security flaw to access users’ devices to do many things: install apps, manipulate users’ data, and even create a new account with full privileges. The PrintNightmare vulnerability seems to be a result of the unpatched critical flaw in Windows Print Spooler. What is Print Spooler? It is a program that’s in charge of the printing on Windows computers.

Two vulnerabilities are involved in the Print Spooler flaw.

  • Local privilege escalation: the hackers/attackers can get access to a compromised computer with only a low degree of privilege; then, authorize themselves with the admin or system level rights.
  • Remote code execution: it makes local access and lateral movement into other systems (for example, a domain controller) easy jobs for the criminals.
Tip: A vulnerability can be very annoying; it may broke your system and damage your precious data suddenly. If any of your important files are deleted but you need them back, you might as well try the following recovery software developed by MiniTool Solution.

MiniTool Power Data Recovery TrialClick to Download100%Clean & Safe

In fact, the vulnerability has been there for some time, but it’s not discovered until a few days ago when Sangfor security researchers published a proof-of-concept (POC) exploit accidentaly. They released a kit on Github talking about how to exploit the weakness, assuming that it had been addressed earlier in June, 2021 when Microsoft took measures to fix another Windows Spool issue. This is actually a mistake.

Though the test code was quickly deleted, it had already been forked on GitHub. Several days later, Microsoft noticed the flaw and issued an alert about it. Now, Microsoft warns Windows users of this potentially major zero-day security flaw in Windows Print Spooler service.

Windows Patches Zero-day Vulnerability, But Still Vulnerable
Windows Patches Zero-day Vulnerability, But Still Vulnerable

The zero-day vulnerability is still open to attacks, despite the recent patch released by Microsoft Windows.

Read More

Till now, millions of Windows computers have been exposed to PrintNightmare related severe safety problems. How to protect your system from the problems? Microsoft is working on finding print spooler vulnerability fix and it recommends that users should disable the Windows Print Spooler service temporarily or update Windows to the latest version before a patch is finally released.

Deleted POC of PrintNightmare

Disable Print Spooler Windows 10 Using PowerShell

Many users choose to disable the Spooler service on Windows 10 by using PowerShell commands so as to mitigate the PrintNightmare vulnerability.

  1. Press Windows + X or right click on the Start button.
  2. Select Windows PowerShell (Admin) from the WinX menu.
  3. Type Stop-Service -Name Spooler -Force into the PowerShell window.
  4. Press Enter to execute the command to stop Spooler service.
  5. Type Set-Service -Name Spooler -StartupType Disabled and press Enter to prevent Windows from re-enabling the service at startup.

[Fixed] WinX Menu Not Working In Windows 10.

Disable Print Spooler in PowerShell

How to Re-enable Print Spooler Using PowerShell

You’ll need to restart Print Spooler when the patch or fix is finally out. But how to restart printer spooler Windows 10 using PowerShell?

  1. Open Windows PowerShell as an administrator.
  2. Type Set-Service -Name Spooler -StartupType Automatic and press Enter.
  3. Type Start-Service -Name Spooler and press Enter.

Disable Print Spooler Windows 10 via Local Group Policy Editor

  1. Press Windows + S to open Windows search.
  2. Type gpedit.msc into the search box.
  3. Click gpedit.msc or press Enter to open the Local Group Policy Editor.
  4. Expand Computer Configuration and Administrative Templates. Then, select Printers in the left pane.
  5. Double click on Allow Print Spooler to accept client connections in the right pane.
  6. Check Disabled. Then, click Apply and OK to confirm the change.

Disable Print Spooler in Group Policy

How to Re-enable Print Spooler with Group Policy

Please follow this to finish Windows 10 restart Print Spooler:

  1. Open Local Group Policy Editor.
  2. Go to Computer Configuration -> Administrative Templates -> Printers.
  3. Double click on Allow Print Spooler to accept client connections.
  4. Check Not Configured. Then, click Apply and OK.
  • linkedin
  • reddit