PrintNightmare vulnerability

Post Reply
Space

Posts: 2841
Joined: Sun Jun 02, 2013 9:44 pm
Location:

HTPC Specs: Show details

PrintNightmare vulnerability

#1

Post by Space » Tue Jul 13, 2021 5:38 am

Has anyone been able to determine what needs to be done to protect from the PrintNightmare vulnerability on Windows 7 machines?

I know this is not directly related to WMC, but I figured there are a large number of people using Windows 7 here, so fixing this vulnerability may be of interest to those on this forum.

Microsoft has rolled out a patch for Win7 but apparently it does not completely fix the problem, plus I'm not sure most people can even install this patch if they don't have an extended support contract with Microsoft.

One thing I saw is that you can disable the Printer Spooler service if you don't print from your system (I would think most dedicated Win7 WMC machines would not need print ability), but it is difficult to find Win7 specific remediation information...

https://www.digitaltrends.com/computing ... right-now/

User avatar
StinkyImp

Posts: 675
Joined: Thu May 11, 2017 7:53 pm
Location:

HTPC Specs: Show details

#2

Post by StinkyImp » Tue Jul 13, 2021 1:11 pm

Space wrote: Tue Jul 13, 2021 5:38 amI'm not sure most people can even install this patch if they don't have an extended support contract with Microsoft.
Thanks for this information! :thumbup:

I don't have an extended support contract but was able to download and install the Win 7 patch from here https://www.catalog.update.microsoft.co ... 5004953%20

wilme2

Posts: 57
Joined: Mon Jul 08, 2013 6:33 pm
Location:

HTPC Specs: Show details

#3

Post by wilme2 » Tue Jul 13, 2021 2:55 pm

I was concerned too. Were you able to just install the linked patch? When I looked over the prerequisites it looked complicated.

User avatar
StinkyImp

Posts: 675
Joined: Thu May 11, 2017 7:53 pm
Location:

HTPC Specs: Show details

#4

Post by StinkyImp » Tue Jul 13, 2021 8:27 pm

wilme2 wrote: Tue Jul 13, 2021 2:55 pmWere you able to just install the linked patch?
It turns out that it did not install. When I hit the download I selected the open with "Windows Standalone Installer" option and walked away. I just returned and it says I have to install the "Windows Update Module Installer" (KB2533552). I downloaded it from here -> https://www.catalog.update.microsoft.co ... =KB2533552

Then I was informed that KB2533552 was already installed and there was no mechanism to remove it. After that It becomes a continual loop for me so, it's a no-go. :|

unclebun

Posts: 150
Joined: Sun Jul 09, 2017 11:06 pm
Location:

HTPC Specs: Show details

#5

Post by unclebun » Wed Jul 14, 2021 1:56 am

The patch is supposed to go automatically to all Windows 7 computers via Windows Update.

stuartm

Posts: 723
Joined: Mon Nov 05, 2012 8:05 pm
Location: Longmont, CO

HTPC Specs: Show details

#6

Post by stuartm » Wed Jul 14, 2021 2:10 am

Many of us long ago disabled updates on Windows 7

Space

Posts: 2841
Joined: Sun Jun 02, 2013 9:44 pm
Location:

HTPC Specs: Show details

#7

Post by Space » Wed Jul 14, 2021 4:01 am

I've just stopped and disabled the "Print Spooler" in Services for now. There may be some things that can be done with the registry to allow local printing while also protecting the system from this issue, but I haven't been able to get clear information about this for Win7.

User avatar
StinkyImp

Posts: 675
Joined: Thu May 11, 2017 7:53 pm
Location:

HTPC Specs: Show details

#8

Post by StinkyImp » Wed Jul 14, 2021 2:19 pm

From Digital Trends
There are some workarounds for this matter, but most are up to system administrators to enable.
The first workaround is to disable the print spooler service using Powershell.
A second temporary fix involves using Group Policy to disable remote printing.
I'm not finding anything that specifies how hackers are compromising systems. Is it a result of shoddy OpSec? I don't perform any risky procedures like surfing sketchy websites, opening email attachments, downloading cracked software, etc.

Does anyone know what attack vectors are used?

Space

Posts: 2841
Joined: Sun Jun 02, 2013 9:44 pm
Location:

HTPC Specs: Show details

#9

Post by Space » Wed Jul 14, 2021 10:18 pm

I haven't dived in to this, but I would assume it if has to do with the print spooler that it's about open network ports (the spooler) that allow someone to connect to your computer and exploit it.

If so, this would mean that if you are behind a firewall that does not allow access to the spooler ports you should be protected, but not if you are connected to a public WiFi without a firewall.

Also, if a separate exploit is used to get in to your computer or LAN (bypassing the firewall), they could then use this exploit to get root/system access which allows them to pretty much do anything they want on your PC.

But this is all just speculation based on the small amount of information I read, so don't trust me on this. I really don't have the time or motivation to figure this all out, I am hoping someone else will do that work, but as you've said, there isn't a lot of information, particularly with regard to mitigation on Win7.

unclebun

Posts: 150
Joined: Sun Jul 09, 2017 11:06 pm
Location:

HTPC Specs: Show details

#10

Post by unclebun » Thu Jul 15, 2021 12:37 pm

unclebun wrote: Wed Jul 14, 2021 1:56 am The patch is supposed to go automatically to all Windows 7 computers via Windows Update.
I was wrong. I had read that in an early article, but it turns out it's only for ESU customers.

glorp

Posts: 369
Joined: Sun Sep 23, 2012 2:54 pm
Location:

HTPC Specs: Show details

#11

Post by glorp » Thu Jul 15, 2021 6:17 pm

The exploit involves a user installing a new unsigned printer driver that then acts as a trojan, allowing for remote code execution. The patch disables non-Adminstrative users from installing unsigned printer drivers which they can do by default. You need ESU to install the patch on Win7.

wilme2

Posts: 57
Joined: Mon Jul 08, 2013 6:33 pm
Location:

HTPC Specs: Show details

#12

Post by wilme2 » Thu Jul 15, 2021 9:55 pm

Space wrote: Wed Jul 14, 2021 4:01 am I've just stopped and disabled the "Print Spooler" in Services for now.
That is what I am doing. I don't even have any printer drivers installed...

User avatar
StinkyImp

Posts: 675
Joined: Thu May 11, 2017 7:53 pm
Location:

HTPC Specs: Show details

#13

Post by StinkyImp » Fri Jul 16, 2021 4:27 pm

glorp wrote: Thu Jul 15, 2021 6:17 pmThe exploit involves a user installing a new unsigned printer driver that then acts as a trojan, allowing for remote code execution.
If this is the case, then I'm golden. All the computers I've ever owned had the OEM or Microsoft drivers installed upon initialization. I've never had a compelling reason to update them! :thumbup:

Post Reply