CVE-2024-21433

7.0 HIGH

📋 TL;DR

This vulnerability allows attackers to elevate privileges on Windows systems by exploiting the Print Spooler service. Attackers could gain SYSTEM-level access on affected Windows versions. This affects Windows systems with Print Spooler enabled.

💻 Affected Systems

Products:
  • Windows
Versions: Windows 10, Windows 11, Windows Server 2016, Windows Server 2019, Windows Server 2022
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Requires Print Spooler service to be running. Print Spooler is enabled by default on most Windows installations.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full SYSTEM-level compromise allowing complete control over the system, installation of malware, credential theft, and lateral movement across the network.

🟠

Likely Case

Local privilege escalation from standard user to SYSTEM privileges, enabling persistence, credential dumping, and further exploitation.

🟢

If Mitigated

Limited impact with proper network segmentation, least privilege enforcement, and Print Spooler disabled on non-essential systems.

🌐 Internet-Facing: LOW
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires local access to the system. No public exploit code available at this time.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: March 2024 security updates

Vendor Advisory: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21433

Restart Required: Yes

Instructions:

1. Apply March 2024 Windows security updates via Windows Update. 2. For enterprise environments, deploy updates through WSUS or SCCM. 3. Restart affected systems after patch installation.

🔧 Temporary Workarounds

Disable Print Spooler Service

windows

Disables the vulnerable Print Spooler service to prevent exploitation

sc stop spooler
sc config spooler start= disabled

Restrict Print Spooler via Group Policy

windows

Configure Group Policy to restrict Print Spooler service on non-essential systems

🧯 If You Can't Patch

  • Disable Print Spooler service on all non-essential systems
  • Implement network segmentation to isolate systems requiring Print Spooler functionality

🔍 How to Verify

Check if Vulnerable:

Check if Print Spooler service is running and system has not applied March 2024 security updates

Check Version:

systeminfo | findstr /B /C:"OS Name" /C:"OS Version"

Verify Fix Applied:

Verify March 2024 security updates are installed and Print Spooler service version is updated

📡 Detection & Monitoring

Log Indicators:

  • Event ID 7036 for Print Spooler service restarts
  • Unusual Print Spooler service activity
  • Failed Print Spooler service operations

Network Indicators:

  • Unusual RPC traffic to Print Spooler service
  • SMB traffic to print shares

SIEM Query:

EventID=7036 AND ServiceName="Spooler" | stats count by host

🔗 References

📤 Share & Export