DETECTION OVERVIEW
Risk Factors
The Windows Print Spooler service with the PrintNightmare vulnerability runs on Windows domain controllers by default. Exploit code for the PrintNightmare vulnerability is publicly available. An authenticated attacker with network access to a vulnerable device can run arbitrary code with SYSTEM privileges, gaining complete control of a device.
Category

The Microsoft Windows Print Spooler service contains a vulnerability that fails to restrict access to RpcAddPrinterDriverEx() and RpcAsyncAddPrinterDriver, which are operations for remotely installing a printer driver on a system. An attacker makes a remote procedure call (RPC) to RpcAddPrinterDriverEx() or RpcAsyncAddPrinterDriver() operations to specify a printer driver file (such as a DLL file) to install on a server. The DLL file contains malicious code. In modern Microsoft environments, the operations and malicious DLL file name can be concealed from network defenders within an encrypted SMBv3 or RPC connection. After the Print Spooler service, spoolsv.exe, runs the malicious, arbitrary code in the DLL file with SYSTEM privileges, the attacker can install programs, change data, or create new accounts with full user rights.
Network analysis and visibility solutions remain underrepresented in enterprises. Find out why in this preview of a new Wave report.
ExtraHop® Named a Leader in First-Ever Gartner® Magic Quadrant™ for Network Detection and Response
Visit this resource for more information.
This analysis exposes the critical link between an organization's lack of internal visibility and the escalating cost of compromise, demanding an urgent re-evaluation of how core business assets are protected.
Learn why you need to be wary of the claims certain network detection and response providers make about their coverage against the MITRE ATT&CK framework.
Learn how NDR from RevealX helps security teams detect and investigate more adversary TTPs in the MITRE ATT&CK framework than rule-based tools.
