Microsoft Print Spooler Vulnerability
Microsoft has released an advisory regarding Windows Print Spooler vulnerability (CVE-2021-34527), colloquially named PrintNightmare. When this vulnerability is exploited, an authenticated user may be able to execute arbitrary code with SYSTEM privileges and attackers could potentially leverage for gaining access to Domain
Controllers, then install programs; view, change, or delete data; or create new accounts with full user rights.
Print Spooler is Microsoft's service for managing and monitoring files printing. Every Microsoft machine (servers and endpoints) has this feature enabled by default. The products and versions affected by this vulnerability are listed below:
As soon as an attacker gains limited user access to a network, he will be able to connect (directly or remotely) to the Print Spooler. Since the Print Spooler has direct access to the kernel, the attacker can use it to gain access to the operating system, run remote code with system privileges, and ultimately attack the Domain Controller, then
perform further attacks with domain admin privilege.
The National Cyber Security Authority (NCSA) recommends all Microsoft users and administrators to:
For further information and support, please contact the National Cyber Security Authority (NCSA) by email to rwcsirt@ncsa.gov.rw or call us on 9009
Microsoft Corporation - June 2021 Security Updates
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-34527
The Hacker News
https://thehackernews.com/2021/07/how-to-mitigate-microsoft-print-spooler.html
12 July 2021
© 2025 National Cyber Security Authority