CVE-2023-24927

8.8 HIGH

📋 TL;DR

This vulnerability allows remote attackers to execute arbitrary code on systems using Microsoft PostScript and PCL6 Class Printer Drivers. Attackers can exploit this by sending specially crafted print jobs to vulnerable systems. Affected systems include Windows servers and workstations with these printer drivers installed.

💻 Affected Systems

Products:
  • Microsoft PostScript Printer Driver
  • Microsoft PCL6 Class Printer Driver
Versions: All versions prior to security updates released in May 2023
Operating Systems: Windows 10, Windows 11, Windows Server 2016, Windows Server 2019, Windows Server 2022
Default Config Vulnerable: ⚠️ Yes
Notes: Systems with these printer drivers installed are vulnerable. Print servers and workstations with network printing capabilities are at highest risk.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise with administrative privileges, enabling data theft, ransomware deployment, or persistent backdoor installation.

🟠

Likely Case

Privilege escalation leading to lateral movement within networks, particularly in enterprise environments with shared print servers.

🟢

If Mitigated

Limited impact with proper network segmentation and print server isolation, potentially only affecting the print spooler service.

🌐 Internet-Facing: MEDIUM - Requires print services exposed to internet, which is uncommon but possible with cloud print solutions.
🏢 Internal Only: HIGH - Print servers are common internal infrastructure, and authenticated users can exploit this vulnerability.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires sending malicious print jobs to vulnerable systems. Attackers need some level of access to the print system, either locally or via network.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Security updates released in May 2023 (KB5026372 for Windows 10, KB5026370 for Windows 11, etc.)

Vendor Advisory: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24927

Restart Required: Yes

Instructions:

1. Apply May 2023 security updates from Windows Update. 2. For enterprise environments, deploy updates via WSUS or SCCM. 3. Restart affected systems after patch installation.

🔧 Temporary Workarounds

Disable vulnerable printer drivers

windows

Remove or disable Microsoft PostScript and PCL6 Class Printer Drivers from systems

Remove-PrinterDriver -Name "Microsoft PostScript Printer Driver"
Remove-PrinterDriver -Name "Microsoft PCL6 Class Printer Driver"

Restrict print spooler access

windows

Configure firewall rules to restrict access to print spooler service (port 445, 139, 9100)

New-NetFirewallRule -DisplayName "Block Print Spooler" -Direction Inbound -Protocol TCP -LocalPort 445,139,9100 -Action Block

🧯 If You Can't Patch

  • Network segmentation: Isolate print servers from critical systems and restrict access to authorized users only.
  • Monitor print spooler logs for unusual activity and implement strict access controls on print management interfaces.

🔍 How to Verify

Check if Vulnerable:

Check if Microsoft PostScript or PCL6 Class Printer Drivers are installed via Print Management console or PowerShell: Get-PrinterDriver | Where-Object {$_.Name -like "*PostScript*" -or $_.Name -like "*PCL6*"}

Check Version:

systeminfo | findstr /B /C:"OS Name" /C:"OS Version"

Verify Fix Applied:

Verify May 2023 security updates are installed: Get-HotFix | Where-Object {$_.HotFixID -like "KB50263*"}

📡 Detection & Monitoring

Log Indicators:

  • Event ID 307 in Windows Print Service logs for failed print jobs
  • Unusual print job submissions from unexpected sources
  • Print spooler service crashes (Event ID 7031)

Network Indicators:

  • Unusual SMB traffic to print servers
  • Print job submissions over non-standard ports
  • Multiple failed authentication attempts to print services

SIEM Query:

source="Windows" AND (event_id=307 OR event_id=7031) AND (process="spoolsv.exe" OR service="Spooler")

🔗 References

📤 Share & Export