A high* level vulnerability related to Windows Print Spooler has just published.
The vulnerability is classified as Elevation of Privilege Vulnerability. An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.
Affected Systems
IoC’s
-
Recommended Solution(s)
As a workaround the steps listed below can be applied.
Run the following in Windows PowerShell to determine if the print spooler service is
running:
Get-Service -Name Spooler
If the Print Spooler is running or if the service is not disabled, follow these steps.
If stopping and disabling the Print Spooler service is appropriate for your environment,
run the following in Windows PowerShell:
Stop-Service -Name Spooler -Force
Set-Service -Name Spooler -StartupType Disabled
Stopping and disabling the “Print Spooler” service disables the ability to print both locally and remotely.
It is highly recommended to install “Monthly Rollup” or “Security Only” releases listed
below according to OS:
https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2022-22041#securityUpdates
CVE / CWE
CVE-2022-22041
Related Website(s)
* Vulnerabilities with a CVSS 3.1 score between 7.0 and 8.9 are evaluated to be “high” whereas vulnerabilities with a CVSS 3.1 score between 9.0 and 10.0 are evaluated to be “critical”.
+90 216 504 53 32
Aydınevler Mahallesi,İsmet İnönü Cadddesi,Küçükyalı Ofis Park A Blok,No:20/1 Maltepe İstanbul
+90 312 235 44 51
You can register to our newsletter on the home page to be instantly informed about security vulnerabilities.