CVE-2022-30226
📋 TL;DR
This vulnerability allows attackers to gain SYSTEM-level privileges on Windows systems by exploiting the Print Spooler service. It affects Windows servers and workstations where the Print Spooler service is running. Attackers need local access to exploit this vulnerability.
💻 Affected Systems
- Windows 10
- Windows 11
- Windows Server 2016
- Windows Server 2019
- Windows Server 2022
📦 What is this software?
Windows 10 by Microsoft
Windows 10 by Microsoft
Windows 10 by Microsoft
Windows 10 by Microsoft
Windows 10 by Microsoft
Windows 10 by Microsoft
Windows 10 by Microsoft
Windows 10 by Microsoft
Windows 10 by Microsoft
Windows 10 by Microsoft
Windows 10 by Microsoft
Windows 10 by Microsoft
Windows 10 by Microsoft
Windows 10 by Microsoft
Windows 10 by Microsoft
Windows 10 by Microsoft
Windows 11 by Microsoft
Windows 11 by Microsoft
Windows 7 by Microsoft
Windows 7 by Microsoft
Windows 8.1 by Microsoft
Windows 8.1 by Microsoft
Windows Rt 8.1 by Microsoft
⚠️ Risk & Real-World Impact
Worst Case
Complete system compromise with SYSTEM privileges, allowing installation of malware, credential theft, and lateral movement across the network.
Likely Case
Local privilege escalation from standard user to SYSTEM, enabling persistence mechanisms and access to sensitive system resources.
If Mitigated
Limited impact if proper access controls and monitoring are in place, though privilege escalation could still occur.
🎯 Exploit Status
Requires local access to the system. Exploit code has been publicly released and is relatively simple to execute.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: July 2022 security updates (KB5015807, KB5015808, etc.)
Vendor Advisory: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30226
Restart Required: Yes
Instructions:
1. Apply July 2022 Windows security updates from Microsoft Update. 2. Restart the system. 3. Verify the patch is installed via Windows Update history or systeminfo command.
🔧 Temporary Workarounds
Disable Print Spooler Service
windowsStops the vulnerable service from running, preventing exploitation.
sc stop spooler
sc config spooler start=disabled
Restrict Spooler Directory Permissions
windowsLimits access to the spooler directory to reduce attack surface.
icacls C:\Windows\System32\spool\PRINTERS /deny "Authenticated Users":(OI)(CI)F
🧯 If You Can't Patch
- Disable Print Spooler service on all non-print servers
- Implement strict access controls and monitor for suspicious spooler service activity
🔍 How to Verify
Check if Vulnerable:
Check if July 2022 security updates are installed via 'systeminfo' command or Windows Update history.
Check Version:
systeminfo | findstr /B /C:"OS Name" /C:"OS Version"
Verify Fix Applied:
Verify KB5015807 (or equivalent for your Windows version) is installed and Print Spooler service is either patched or disabled.
📡 Detection & Monitoring
Log Indicators:
- Event ID 7036 for Print Spooler service stopping/starting unexpectedly
- Suspicious process creation from spoolsv.exe
- Access denied errors in Print Spooler logs
Network Indicators:
- Unusual RPC calls to spooler service
- SMB connections to print spooler shares
SIEM Query:
EventID=7036 AND ServiceName="Spooler" AND (State="stopped" OR State="started") | where TimeGenerated > ago(1h)