Skip to content

Latest commit

 

History

History
71 lines (63 loc) · 5.03 KB

CVEs.md

File metadata and controls

71 lines (63 loc) · 5.03 KB

History

  • “The Printer Bug”, identified in 2018

    • To exploit this vector, an unprivileged attacker in the network can remotely request a domain controller’s Print Spooler service to update an attacker-controlled host on new print jobs
    • calling the RpcRemoteFindFirstPrinterChangeNotificationEx API
    • The domain Controller would then authenticate to the attacker-controlled host, an act that can be abused to impersonate the domain Controller and compromise the domain in case of running on a system with unconstrained Kerberos Delegation
    • can be leveraged for some NTLM relay use cases, in case that the victim’s computer account has administrative access on other machines.
    • Microsoft has classified this behavior as an intended one, by design, and do not plan on fixing it.
  • Print Demon (CVE-2020-1048) (CVE-2020-1070 ??) (disclosed and patched May 2020)

    • write an arbitrary file by creating a printer port that pointed to a file on a disk
    • Microsoft patched this flaw by checking permissions before allowing a user to add a port
  • CVE-2020-1337 (August 2020)

    • bypass della patch di Print Demon via a junction directory.
  • CVE-2020-1030 (Sept 2020)

    • allowed an attacker to create a file or directory by "configuring the SpoolDirectory attribute on a printer"
    • patch: Apply a permissions check to see if the current user had privileges to create the file or directory, respectively.
  • PrintNightmare - Microsoft -- CVE-2021-1675 (June 2021)

    • Initially, it was classified as a low severity vulnerability allowing Local Privilege Escalation (LPE)
    • on June 21st, Microsoft changed the classification as it was discovered that the flaw allows Remote Code Execution (RCE) as well.
    • addresses a different vulnerability in the same Print Spooler API call. For CVE 1675, the attacker needs to have direct access to the machine to use a malicious DLL file to escalate privileges. While with CVE 34527, the attacker can remotely inject DLLs
  • PrintNightmare - PoC Version -- CVE-2021-34527 (July 2021)

    • attacker must be authenticated
    • once this is achieved the attacker can run code as NT AUTHORITY\SYSTEM
    • Windows would fail to restrict access to the functionality that allows a user to add printers and drivers.
    • Remote Code Execution (RCE) on any Server or Workstation with the Print Spooler service enabled.
    • in case where a certain non-default configuration is set (Point and Print warnings disabled), the patch can be bypassed to gain both RCE and LPE.
  • SpoolFool CVE-2022-21999

    • actually two bypasses for CVE-2020-1030 (permissions-check bypass to write an arbitrary file using symbolic links.)

The Printer Bug

Resources

Print Demon (CVE-2020-1048)

It allows an attacker to write an arbitrary file by creating a printer port that pointed to a file on a disk.

Resources

SpoolFool

  • CVE-2020-1030 Allows arbitrary writing to the file system.
  • spoolfool = bypass della patch di CVE-2020-1030

Resources

https://research.ifcr.dk/spoolfool-windows-print-spooler-privilege-escalation-cve-2022-22718-bf7752b68d81 https://www.accenture.com/us-en/blogs/cyber-defense/discovering-exploiting-shutting-down-dangerous-windows-print-spooler-vulnerability

Windows versions needed for SpoolFool CVE-2020-1337

Windows 7, Windows RT 8.1, Windows 10, Windows server 2008, Windows server 2012 R2, Windows server 2016, Windows server 2019, Windows server 2024.

Windows versions needed for SpoolFool CVE-2020-1030

Windows 7, Windows 8.1, Windows 8.1 RT, Windows 10, Windows server 2004, Windows server 2008, Windows server 2008 R2, Windows server 2012, Windows server 2012 R2, Windows server 2019.

Print Nightmare

  • Microsoft: CVE-2021-1675
  • Researchers POC: CVE-2021-34527

Windows versions needed for CVE-2021-34527

Windows Server 2004, Windows Server 2008, Windows Server 2012, Windows Server 2012 R2, Windows Server 2016, Windows Server 2019, Windows 7, Windows RT 8.1, Windows 8.1, and Windows 10. Microsoft release a list of updates (KBXXXXX) corresponding to each version of Windows concerned. However Microsoft's PrintNightmare security patch is incomplete.

Bibliography