Executive Summary
Summary | |
---|---|
Title | Microsoft Windows Print Spooler allows for RCE via AddPrinterDriverEx() |
Informations | |||
---|---|---|---|
Name | VU#383432 | First vendor Publication | 2021-06-30 |
Vendor | VU-CERT | Last vendor Modification | 2021-08-03 |
Severity (Vendor) | N/A | Revision | M |
Security-Database Scoring CVSS v3
Cvss vector : CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H | |||
---|---|---|---|
Overall CVSS Score | 8.8 | ||
Base Score | 8.8 | Environmental Score | 8.8 |
impact SubScore | 5.9 | Temporal Score | 8.8 |
Exploitabality Sub Score | 2.8 | ||
Attack Vector | Network | Attack Complexity | Low |
Privileges Required | None | User Interaction | Required |
Scope | Unchanged | Confidentiality Impact | High |
Integrity Impact | High | Availability Impact | High |
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:M/Au:N/C:C/I:C/A:C) | |||
---|---|---|---|
Cvss Base Score | 9.3 | Attack Range | Network |
Cvss Impact Score | 10 | Attack Complexity | Medium |
Cvss Expoit Score | 8.6 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
OverviewThe Microsoft Windows Print Spooler service fails to restrict access to functionality that allows users to add printers and related drivers, which can allow a remote authenticated attacker to execute arbitrary code with SYSTEM privileges on a vulnerable system. DescriptionThe RpcAddPrinterDriverEx() function is used to install a printer driver on a system. One of the parameters to this function is the DRIVER_CONTAINER object, which contains information about which driver is to be used by the added printer. The other argument, Note that while original exploit code relied on the While Microsoft has released an update for CVE-2021-1675, it is important to realize that this update does NOT protect against public exploits that may refer to On July 1, Microsoft released CVE-2021-34527. This bulletin states that CVE-2021-34527 is similar but distinct from the vulnerability that is assigned CVE-2021-1675, which addresses a different vulnerability in RpcAddPrinterDriverEx(). The attack vector is different as well. CVE-2021-1675 was addressed by the June 2021 security update. ImpactBy sending a request to add a printer, e.g. by using SolutionApply an updateMicrosoft has addressed this issue in the updates for CVE-2021-34527. Note that the Microsoft update for CVE-2021-34527 does not effectively prevent exploitation of systems where the Point and Print Apply a workaroundMicrosoft has listed several workarounds in their advisory for CVE-2021-34527. Specifically: Microsoft Option 1 - Stop and disable the Print Spooler serviceThis vulnerability can be mitigated by stopping and disabling the Print Spooler service in Windows. If disabling the Print Spooler service is appropriate for your enterprise, use the following PowerShell commands:
Impact of workaround Disabling the Print Spooler service disables the ability to print both locally and remotely. Microsoft Option 2 - Disable inbound remote printing through Group PolicyDisable the ?Allow Print Spooler to accept client connections:? policy to block remote attacks. Impact of workaround This policy will block the remote attack vector by preventing inbound remote printing operations. The system will no longer function as a print server, but local printing to a directly attached device will still be possible. Note: The Print Spooler service must be restarted for this workaround to be activated. Block RPC and SMB ports at the firewallLimited testing has shown that blocking both the RPC Endpoint Mapper ( Enable security prompts for Point and PrintEnsure that the Windows Point and Print Restrictions are set to Restrict printer driver installation ability to administratorsAfter the Microsoft update for CVE-2021-34527 is installed, a registry value called AcknowledgementsThis issue was publicly disclosed by Zhiniang Peng and Xuefeng Li. This document was written by Will Dormann. |
Original Source
Url : https://kb.cert.org/vuls/id/383432 |
CPE : Common Platform Enumeration
Alert History
Date | Informations |
---|---|
2021-09-23 17:17:44 |
|
2021-08-03 21:18:00 |
|
2021-07-13 05:17:36 |
|
2021-07-13 00:17:36 |
|
2021-07-09 21:18:01 |
|
2021-07-08 21:17:57 |
|
2021-07-08 05:17:35 |
|
2021-07-07 21:17:58 |
|
2021-07-07 05:17:37 |
|
2021-07-07 00:17:37 |
|
2021-07-06 17:17:39 |
|
2021-07-06 09:17:34 |
|
2021-07-06 00:17:35 |
|
2021-07-05 21:17:55 |
|
2021-07-05 17:17:35 |
|
2021-07-02 17:17:41 |
|
2021-07-02 00:17:38 |
|
2021-07-01 00:17:36 |
|