CVE-2022-29132

7.8 HIGH

📋 TL;DR

This vulnerability allows attackers to gain SYSTEM-level privileges on Windows systems by exploiting the Print Spooler service. It affects Windows servers and workstations where the Print Spooler service is running. Attackers can execute arbitrary code with elevated privileges if they can run code on the target system.

💻 Affected Systems

Products:
  • Windows 10
  • Windows 11
  • Windows Server 2016
  • Windows Server 2019
  • Windows Server 2022
Versions: Multiple versions prior to May 2022 security updates
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Requires Print Spooler service to be running. Print Spooler is enabled by default on most Windows systems.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with SYSTEM privileges, enabling installation of persistent malware, credential theft, lateral movement across the network, and data exfiltration.

🟠

Likely Case

Local privilege escalation from a lower-privileged user account to SYSTEM, allowing attackers to bypass security controls and maintain persistence on compromised systems.

🟢

If Mitigated

Limited impact if Print Spooler service is disabled on non-essential systems and proper network segmentation is in place.

🌐 Internet-Facing: LOW with brief explanation
🏢 Internal Only: HIGH with brief explanation

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires local access or ability to execute code on the target system. The vulnerability is in the Print Spooler service which runs with SYSTEM privileges.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: May 10, 2022 security updates (KB5013942 for Windows 10 21H2, KB5013943 for Windows 11, etc.)

Vendor Advisory: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-29132

Restart Required: Yes

Instructions:

1. Apply May 2022 Windows security updates from Microsoft Update. 2. Restart the system to complete installation. 3. Verify the update is installed via Windows Update history or system information.

🔧 Temporary Workarounds

Disable Print Spooler Service

windows

Stops the vulnerable service from running, preventing exploitation. This will disable printing functionality.

sc stop spooler
sc config spooler start= disabled

Restrict Spooler Directory Permissions

windows

Modify permissions on the spool directory to prevent unauthorized access.

icacls C:\Windows\System32\spool\PRINTERS /deny Everyone:(OI)(CI)(DE,DC)

🧯 If You Can't Patch

  • Disable Print Spooler service on all non-essential systems, especially servers that don't require printing functionality.
  • Implement network segmentation to isolate systems with Print Spooler enabled and restrict lateral movement capabilities.

🔍 How to Verify

Check if Vulnerable:

Check if Print Spooler service is running and system hasn't received May 2022 security updates: 'sc query spooler' and 'systeminfo | findstr /B /C:"OS Name" /C:"OS Version"'

Check Version:

systeminfo | findstr /B /C:"OS Name" /C:"OS Version"

Verify Fix Applied:

Verify May 2022 security updates are installed: 'wmic qfe list | findstr "KB501394"' or check Windows Update history for KB5013942/KB5013943.

📡 Detection & Monitoring

Log Indicators:

  • Event ID 7036 (Service state changes for spooler)
  • Unexpected Print Spooler service restarts
  • Suspicious process creation from spoolsv.exe

Network Indicators:

  • Unexpected RPC calls to Print Spooler service (port 135, 445)
  • SMB traffic to spooler named pipes

SIEM Query:

EventID=7036 AND ServiceName="spooler" | where ServiceState="running" OR ServiceState="stopped"

🔗 References

📤 Share & Export