Microsoft Alerts Users to New Unresolved Windows Print Spooler RCE Vulnerability

August 12, 2021

Following the release of its Patch Tuesday updates, Microsoft has revealed yet another remote code execution (RCE) vulnerability in the Windows Print Spooler component. The company is actively working on a fix for this issue, scheduled for an upcoming security update. Identified as CVE-2021-36958 (CVSS score: 7.3), this unaddressed vulnerability adds to the ongoing list of issues collectively referred to as PrintNightmare, which have affected the printing service in recent months. Victor Mata from FusionX, Accenture Security, credited with reporting the flaw, noted that the issue was disclosed to Microsoft back in December 2020. “A remote code execution vulnerability occurs when the Windows Print Spooler service improperly handles privileged file operations,” the company stated in its out-of-band bulletin, while reiterating the details of CVE-2021-34481. “An attacker who successfully exploits this vulnerability could execute arbitrary code with system-level privileges…

Microsoft Issues Warning Over New Unpatched Windows Print Spooler RCE Vulnerability

On August 12, 2021, Microsoft publicly acknowledged a newly discovered remote code execution (RCE) vulnerability affecting the Windows Print Spooler service. This announcement came just a day after the company’s Patch Tuesday updates, which typically address various security flaws in its software systems. The newly identified issue, cataloged as CVE-2021-36958 with a CVSS score of 7.3, further complicates an already precarious situation with the Print Spooler component, which has seen a number of vulnerabilities emerge under the umbrella term “PrintNightmare” in recent months.

The Print Spooler service, responsible for managing printing jobs on Windows, has been targeted by various attacks, contributing to serious concerns regarding the security of enterprise systems. Victor Mata from FusionX, a division of Accenture Security, has been recognized for bringing this specific flaw to Microsoft’s attention back in December 2020. According to the information released by Microsoft, the vulnerability arises from improper handling of privileged file operations by the Print Spooler service, potentially allowing an unauthorized actor to execute arbitrary code.

The implications of such a vulnerability extend beyond mere inconvenience; if exploited, it could lead to extensive system compromise. This flaw is particularly concerning as it falls within a well-documented series of weaknesses that have been increasingly exploited by threat actors. Given the historical context, organizations that rely heavily on Windows for their printing operations may find themselves at heightened risk if protective measures are not taken promptly.

The likely targets of this vulnerability are organizations utilizing Windows-based systems, which encompasses a large portion of businesses across various sectors. The United States, home to numerous enterprises that depend on Windows infrastructure, stands to be significantly impacted by these security concerns. The need for vigilance is paramount, as attackers continually refine their methods to exploit vulnerabilities such as this one.

In the context of the MITRE ATT&CK framework, the tactics relevant to this vulnerability cover a spectrum of adversarial techniques. Initial access could be achieved through various vectors, capitalizing on the vulnerability to gain foothold within an organization. Following initial exploitation, persistence methods may be employed to maintain access, while privilege escalation could allow attackers to execute commands with elevated rights, further extending their reach within compromised networks.

As businesses grapple with the implications of this ongoing situation, the urgency for implementing robust cybersecurity practices cannot be overstated. In light of the rapidly evolving threat landscape, where vulnerabilities such as CVE-2021-36958 emerge and prompt potential exploitation, organizations must remain proactive. This includes regular updates and patches, as well as monitoring systems for unusual activity that could indicate attempted exploitation of existing weaknesses. Microsoft has indicated that a security update is on the way, yet the waiting period poses immediate risk, underscoring the necessity for business owners to remain alert and informed in an increasingly complex digital environment.

Source link