CVE-2022-22717

7.0 HIGH

📋 TL;DR

CVE-2022-22717 is a Windows Print Spooler elevation of privilege vulnerability that allows authenticated attackers to execute arbitrary code with SYSTEM privileges. This affects Windows systems with the Print Spooler service enabled. Attackers can exploit this to gain complete control over affected systems.

💻 Affected Systems

Products:
  • Microsoft Windows
Versions: Windows 10, Windows 11, Windows Server 2016, Windows Server 2019, Windows Server 2022
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Affects systems with Print Spooler service enabled (default on most Windows installations). Print servers and workstations with shared printers are particularly vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with SYSTEM privileges, enabling installation of malware, data theft, lateral movement, and persistence establishment.

🟠

Likely Case

Local privilege escalation from standard user to SYSTEM, allowing attackers to bypass security controls and execute malicious payloads.

🟢

If Mitigated

Limited impact with proper network segmentation, least privilege enforcement, and Print Spooler service disabled on non-essential systems.

🌐 Internet-Facing: LOW - Exploitation requires authenticated access, making direct internet exploitation unlikely without prior compromise.
🏢 Internal Only: HIGH - Once an attacker gains initial access to a network, this provides an easy path for privilege escalation and lateral movement.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated user access. Multiple Print Spooler vulnerabilities have been actively exploited in the wild, making this likely to be weaponized.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: January 2022 security updates (KB5009543 for Windows 10 21H2, KB5009557 for Windows Server 2022, etc.)

Vendor Advisory: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-22717

Restart Required: Yes

Instructions:

1. Apply January 2022 Windows security updates via Windows Update. 2. For enterprise environments, deploy updates through WSUS or SCCM. 3. Restart systems after patch installation.

🔧 Temporary Workarounds

Disable Print Spooler Service

windows

Stops the Print Spooler service to prevent exploitation, but disables printing functionality.

sc config spooler start= disabled
net stop spooler

Restrict Print Spooler via Group Policy

windows

Configure Group Policy to disable Print Spooler on non-essential systems.

🧯 If You Can't Patch

  • Disable Print Spooler service on all non-essential systems
  • Implement network segmentation to isolate print servers and restrict access to Print Spooler ports (TCP 135, 139, 445, 9100)

🔍 How to Verify

Check if Vulnerable:

Check if Print Spooler service is running: 'sc query spooler' and verify Windows version is unpatched.

Check Version:

systeminfo | findstr /B /C:"OS Name" /C:"OS Version"

Verify Fix Applied:

Verify January 2022 security updates are installed via 'systeminfo' or 'Get-Hotfix -Id KB5009543' (adjust KB number for your version).

📡 Detection & Monitoring

Log Indicators:

  • Event ID 7036 for Print Spooler service stops/starts
  • Suspicious Print Spooler service manipulation
  • Unexpected SYSTEM privilege processes spawned from spoolsv.exe

Network Indicators:

  • Unexpected RPC calls to Print Spooler service
  • Anomalous traffic to print server ports from non-print clients

SIEM Query:

EventID=7036 AND ServiceName="Spooler" | OR | ProcessName="spoolsv.exe" AND ParentProcess NOT IN ("services.exe", "svchost.exe")

🔗 References

📤 Share & Export