Researcher Reveals Yet Another Unpatched Vulnerability in Windows Printer Spooler

Date: July 19, 2021

Just days after Microsoft raised alarms about an unpatched security flaw in the Windows Print Spooler service, yet another potential zero-day vulnerability has surfaced, marking the fourth printer-related issue identified in recent weeks. Will Dormann from the CERT Coordination Center noted in an advisory on Sunday that “Microsoft Windows allows non-admin users to install printer drivers through Point and Print.” He highlighted that printers installed this way can load arbitrary libraries by the privileged Windows Print Spooler process. Security researcher Benjamin Delpy, known for creating Mimikatz, has disclosed an exploit for this vulnerability. #printnightmare – Episode 4

New Unpatched Vulnerability Found in Windows Print Spooler Service

On July 19, 2021, researchers revealed yet another unaddressed security flaw within Microsoft’s Windows Print Spooler service. This recent discovery surfaces only days after Microsoft issued a warning regarding a previously identified vulnerability in the same service, marking the fourth significant printer-related flaw to emerge in just a few weeks.

The vulnerability allows non-administrative users to install printer drivers via the Point and Print feature, as detailed by Will Dormann of the CERT Coordination Center. According to Dormann’s advisory, this mechanism enables the installation of queue-specific files, which may include arbitrary libraries that can be loaded by the privileged Windows Print Spooler process. This opens a pathway for potential exploitation, giving rise to significant security concerns.

The exploit, disclosed by security researcher Benjamin Delpy, who is also known for creating the Mimikatz tool, emphasizes the critical nature of this vulnerability. The implications of using methods associated with flaws in the Print Spooler service underline an ongoing trend of printer-related security incidents that threaten organizational cybersecurity.

Targeting users who may not have extensive technical expertise presents a worrying situation, as such vulnerabilities can be leveraged in various attack scenarios. The nature of this security shortcoming reflects a growing concern over the accessibility of exploitation methods, which can be utilized by threat actors seeking to infiltrate systems without sophisticated skills.

In terms of potential adversary tactics, this situation aligns with several techniques outlined in the MITRE ATT&CK framework. One relevant tactic is initial access. By exploiting the flaw, attackers can gain entry to target systems through the installation of malicious driver files. Furthermore, this vulnerability could facilitate privilege escalation, allowing adversaries to elevate their access privileges and execute additional harmful actions within the system.

As organizations assess the risks presented by such vulnerabilities, it becomes crucial to implement proactive security measures. Awareness initiatives around secure printing practices and regular updates to systems can help mitigate the potential consequences associated with these kinds of attacks. As cybersecurity threats evolve, staying informed about emerging vulnerabilities will be essential for business owners aiming to protect their operations against increasingly sophisticated attack vectors.

In conclusion, the discovery of this unpatched vulnerability in the Windows Print Spooler underscores the need for vigilance and comprehensive security practices within organizations. As the landscape of cyber threats continues to undergo change, understanding these emerging risks will be paramount in ensuring robust cybersecurity defense.

Source link