Heimdal Security Blog

New Print Spooler Zero-Day Has Come to Light: Microsoft Confirmed It

A yesterday Microsoft’s advisory has been brought to the public’s attention: a new Print Spooler zero-day vulnerability was discovered that is dubbed CVE-2021-36958. The consequences might be that local threat actors could achieve system privileges. This flaw is part of the well-known PrintNightmare bugs class we have written a lot about.

How Does the New Print Spooler Zero-Day Work?

Benjamin Delpy, the creator of Mimikatz and the one who has investigated PrintNightmare in the course of time shared a POC (Proof of Concept) on Twitter on this new Print Spooler zero-day.

It works like this:

The video below shows Benjamin Delpy’s POC:

Video Source

Will Dormann, a CERT/CC analyst, shared with BleepingComputer publication his opinion on the matter. He declared that Microsoft confirmed that the security advisory they released for the new bug talks about the same vulnerability Benjamin Delpy describes through his POC. Dormann also added since the vulnerability has CVSS:3.0 7.3 / 6.8 score, it obviously indicates that this is local abuse of privileges, though Microsoft described it as a remote code execution bug.

The new Print Spooler zero-day was firstly discovered by FusionX analyst Victor Mata in December 2020. He says in a Twitter Post that he reported the issue back then, but has not shared further details as per MSRC’S request.

Mitigation Measures for New Print Spooler Zero-Day

There are no security updates released by Microsoft at the moment for this recent bug, however, the software company provided some general mitigation measures in their security advisory:

Image Source

But if users disable the Print Spooler, this means that printing is not possible anymore. BleepingComputer comes with another method. They say that the installation of printers should be done only from authorized servers. How can one do this? Go to ‘Package Point and print – Approved servers’ group policy. The policy can be enabled by launching the Group Policy Editor (gpedit.msc). Then use User Configuration Administrative Templates > Control Panel > Printers > Package Point and Print – Approved Servers. At this point, you should provide the list of authorized servers that will permit print server usage as per your wish and then click on “OK”.

What Is PrintNightmare?

PrintNightmare was classified as a zero-day bug, leaked online by mistake. It takes advantage of Windows Point and Print capability and print drivers. It is also known as a vulnerability in Windows Print Spooler that allows both remote code execution and abusing of the local privilege escalation feature. PrintNightmare bugs were addressed by Microsoft in July and August with security updates, but it seems that a new Print Spooler zero-day has emerged.