CVE-2022-30138

7.8 HIGH

📋 TL;DR

This vulnerability allows an authenticated attacker to gain SYSTEM-level privileges on Windows systems by exploiting the Print Spooler service. It affects Windows servers and workstations where the Print Spooler service is running. Attackers can execute arbitrary code with elevated privileges.

💻 Affected Systems

Products:
  • Windows 10
  • Windows 11
  • Windows Server 2016
  • Windows Server 2019
  • Windows Server 2022
Versions: Multiple versions prior to June 2022 security updates
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Requires Print Spooler service to be running (enabled by default on many Windows installations).

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise with SYSTEM privileges, enabling installation of persistent malware, credential theft, lateral movement across the network, and complete control of affected systems.

🟠

Likely Case

Local privilege escalation from standard user to SYSTEM, allowing attackers to bypass security controls, install backdoors, and access sensitive data on the compromised machine.

🟢

If Mitigated

Limited impact if Print Spooler service is disabled or proper network segmentation prevents lateral movement; attackers would need initial access but could still compromise individual systems.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access to the target system. Multiple proof-of-concept exploits have been published since disclosure.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: June 2022 security updates (KB5014699 for Windows 10, KB5014697 for Windows 11, etc.)

Vendor Advisory: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30138

Restart Required: Yes

Instructions:

1. Apply June 2022 Windows security updates via Windows Update. 2. For enterprise environments, deploy updates through WSUS or SCCM. 3. Restart systems after patch installation.

🔧 Temporary Workarounds

Disable Print Spooler Service

windows

Stops the vulnerable service from running, preventing exploitation but disabling printing functionality.

sc stop spooler
sc config spooler start= disabled

Restrict Spooler Directory Permissions

windows

Modify permissions on the spool directory to prevent unauthorized access.

icacls C:\Windows\System32\spool /deny "Authenticated Users":(OI)(CI)(DE)

🧯 If You Can't Patch

  • Disable Print Spooler service on non-print servers and workstations where printing is not required.
  • Implement network segmentation to isolate systems with Print Spooler enabled and restrict lateral movement.

🔍 How to Verify

Check if Vulnerable:

Check if June 2022 security updates are installed via 'systeminfo' command or Windows Update history.

Check Version:

wmic qfe list | findstr KB5014699

Verify Fix Applied:

Verify KB5014699 (Windows 10) or KB5014697 (Windows 11) is installed and Print Spooler service version is updated.

📡 Detection & Monitoring

Log Indicators:

  • Event ID 7036 for Print Spooler service stops/starts
  • Suspicious process creation from spoolsv.exe
  • Unusual network connections from print spooler

Network Indicators:

  • Unexpected RPC traffic to port 135/445 from systems with Print Spooler enabled
  • SMB connections to spooler shares

SIEM Query:

EventID=7036 AND ServiceName="Spooler" OR ProcessName="spoolsv.exe" AND CommandLine CONTAINS suspicious

🔗 References

📤 Share & Export