CVE-2022-25089
📋 TL;DR
CVE-2022-25089 is a privilege escalation vulnerability in Printix Secure Cloud Print Management where the software incorrectly uses privileged APIs to modify registry keys in HKEY_LOCAL_MACHINE. This allows attackers with local access to gain SYSTEM-level privileges on Windows systems. Organizations using Printix Secure Cloud Print Management version 1.3.1106.0 or earlier are affected.
💻 Affected Systems
- Printix Secure Cloud Print Management
📦 What is this software?
Printix by Kofax
⚠️ Risk & Real-World Impact
Worst Case
Full system compromise with SYSTEM privileges, enabling installation of persistent malware, credential theft, lateral movement, and complete control over the affected system.
Likely Case
Local privilege escalation allowing attackers to bypass security controls, install unauthorized software, modify system configurations, and access sensitive data.
If Mitigated
Limited impact if proper endpoint protection, least privilege principles, and network segmentation are implemented, though local privilege escalation remains possible.
🎯 Exploit Status
Exploit code is publicly available on GitHub and Exploit-DB, making this easily weaponizable by attackers with local access.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Versions after 1.3.1106.0
Vendor Advisory: http://printix.com
Restart Required: Yes
Instructions:
1. Update Printix Secure Cloud Print Management to the latest version. 2. Restart affected systems. 3. Verify the update was successful by checking the version number.
🔧 Temporary Workarounds
Remove Printix Software
windowsUninstall Printix Secure Cloud Print Management if not required
Control Panel > Programs > Uninstall a program > Select Printix > Uninstall
Restrict Registry Permissions
windowsModify registry permissions to prevent unauthorized modifications to HKEY_LOCAL_MACHINE
regedit > Navigate to HKEY_LOCAL_MACHINE > Right-click > Permissions > Restrict access
🧯 If You Can't Patch
- Implement strict endpoint security controls and application whitelisting
- Apply least privilege principles and restrict local administrator access
🔍 How to Verify
Check if Vulnerable:
Check Printix version: If version is 1.3.1106.0 or earlier, the system is vulnerable.
Check Version:
wmic product where name="Printix Secure Cloud Print Management" get version
Verify Fix Applied:
Verify Printix version is greater than 1.3.1106.0 and test privilege escalation attempts fail.
📡 Detection & Monitoring
Log Indicators:
- Registry modification events in HKEY_LOCAL_MACHINE by Printix processes
- Unusual privilege escalation attempts from Printix executables
Network Indicators:
- Unusual outbound connections from Printix services
- Lateral movement attempts following Printix exploitation
SIEM Query:
EventID=4657 OR EventID=4663 AND ProcessName="Printix" AND RegistryKeyPath="HKLM\\"
🔗 References
- http://packetstormsecurity.com/files/167013/Printix-1.3.1106.0-Privileged-API-Abuse.html
- http://printix.com
- https://github.com/ComparedArray/printix-CVE-2022-25089
- https://www.exploit-db.com/exploits/50798
- http://packetstormsecurity.com/files/167013/Printix-1.3.1106.0-Privileged-API-Abuse.html
- http://printix.com
- https://github.com/ComparedArray/printix-CVE-2022-25089
- https://www.exploit-db.com/exploits/50798