CVE-2023-21684

8.8 HIGH

📋 TL;DR

This vulnerability allows remote attackers to execute arbitrary code on systems using Microsoft PostScript and PCL6 Class Printer Drivers. Attackers can exploit this by sending specially crafted print jobs to vulnerable systems. Affected systems include Windows servers and workstations with these printer drivers installed.

💻 Affected Systems

Products:
  • Microsoft Windows
  • Microsoft PostScript Printer Driver
  • Microsoft PCL6 Class Printer Driver
Versions: Windows 10, Windows 11, Windows Server 2016, Windows Server 2019, Windows Server 2022
Operating Systems: Windows 10, Windows 11, Windows Server 2016, Windows Server 2019, Windows Server 2022
Default Config Vulnerable: ⚠️ Yes
Notes: Systems with PostScript or PCL6 printer drivers installed are vulnerable. Print servers and workstations with shared printers are particularly at risk.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise with attacker gaining SYSTEM-level privileges, enabling data theft, ransomware deployment, or persistent backdoor installation.

🟠

Likely Case

Privilege escalation leading to lateral movement within networks, credential harvesting, and installation of malware payloads.

🟢

If Mitigated

Limited impact with proper network segmentation and print server isolation, potentially only affecting the print spooler service.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires sending malicious print jobs to vulnerable systems. No authentication is required if print spooler is accessible.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: January 2023 security updates (KB5022282 for Windows 10, KB5022303 for Windows 11, etc.)

Vendor Advisory: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21684

Restart Required: Yes

Instructions:

1. Apply January 2023 Windows security updates via Windows Update. 2. For enterprise environments, deploy updates through WSUS or SCCM. 3. Restart affected systems after patch installation.

🔧 Temporary Workarounds

Disable Print Spooler Service

windows

Stops the print spooler service to prevent exploitation via print jobs.

sc stop spooler
sc config spooler start= disabled

Restrict Print Spooler Network Access

windows

Blocks remote print job submission via firewall rules.

netsh advfirewall firewall add rule name="Block Print Spooler" dir=in action=block protocol=TCP localport=135,445,9100

🧯 If You Can't Patch

  • Isolate print servers from general network traffic using VLANs or network segmentation.
  • Implement strict access controls to limit who can submit print jobs to vulnerable systems.

🔍 How to Verify

Check if Vulnerable:

Check if PostScript or PCL6 printer drivers are installed and if January 2023 security updates are missing.

Check Version:

wmic qfe list | findstr KB5022282 KB5022303

Verify Fix Applied:

Verify that KB5022282 (Windows 10) or KB5022303 (Windows 11) or equivalent Server updates are installed.

📡 Detection & Monitoring

Log Indicators:

  • Event ID 4625 failed logons to print spooler
  • Unusual print job submissions from unexpected sources
  • Spooler service crashes (Event ID 7031)

Network Indicators:

  • Unexpected connections to TCP ports 135, 445, or 9100
  • Malformed print job network traffic

SIEM Query:

source="Windows Security" AND (event_id=4625 OR event_id=7031) AND process_name="spoolsv.exe"

🔗 References

📤 Share & Export