CVE-2021-36958
📋 TL;DR
This vulnerability allows remote attackers to execute arbitrary code with SYSTEM privileges by exploiting improper file operations in the Windows Print Spooler service. It affects Windows systems with the Print Spooler service enabled, which is common in enterprise environments. Successful exploitation gives attackers complete control over affected systems.
💻 Affected Systems
- Microsoft Windows
📦 What is this software?
Windows by Microsoft
⚠️ Risk & Real-World Impact
Worst Case
Complete system compromise with SYSTEM privileges, allowing installation of malware, data theft, ransomware deployment, and creation of persistent backdoors across the network.
Likely Case
Lateral movement within enterprise networks, credential harvesting, and deployment of ransomware or other malware payloads.
If Mitigated
Limited impact if Print Spooler is disabled or network segmentation prevents lateral movement, though initial compromise could still occur.
🎯 Exploit Status
Multiple proof-of-concept exploits are publicly available. The vulnerability has been actively exploited in the wild.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: August 2021 security updates (KB5005033 for Windows 10, KB5005031 for Windows Server 2019, etc.)
Vendor Advisory: https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-36958
Restart Required: Yes
Instructions:
1. Apply the August 2021 Windows security updates from Microsoft Update. 2. Restart affected systems. 3. Verify the patch is installed via Windows Update history or system information.
🔧 Temporary Workarounds
Disable Print Spooler Service
windowsStops the vulnerable service from running, preventing exploitation but disabling printing functionality.
sc config spooler start= disabled
sc stop spooler
Restrict Spooler Directory Permissions
windowsModifies permissions on the spool directory to prevent unauthorized access.
icacls %systemroot%\system32\spool\printers /grant "SYSTEM:(OI)(CI)F" /grant "Administrators:(OI)(CI)F" /remove "Authenticated Users" /remove "Users"
🧯 If You Can't Patch
- Disable the Print Spooler service on all non-essential systems, especially domain controllers.
- Implement network segmentation to isolate print servers and restrict RPC/SMB traffic to necessary systems only.
🔍 How to Verify
Check if Vulnerable:
Check if Print Spooler service is running and system has not received August 2021 security updates.
Check Version:
systeminfo | findstr /B /C:"OS Name" /C:"OS Version"
Verify Fix Applied:
Verify KB5005033 (or equivalent for your OS version) is installed via 'wmic qfe list' or Windows Update history.
📡 Detection & Monitoring
Log Indicators:
- Event ID 4624 with SYSTEM account from unusual sources
- Spooler service errors (Event ID 10, 11)
- Unusual process creation from spoolsv.exe
Network Indicators:
- Unusual RPC traffic to port 135/445 from unexpected sources
- SMB connections to print spooler shares
SIEM Query:
source="windows" (event_id=4624 AND user="SYSTEM" AND source_network_address!=local) OR (process_name="spoolsv.exe" AND parent_process!="services.exe")