SN-10.CVE-2021-34527 PrintNightmare Vulnerability v1.0.1
SN-10.CVE-2021-34527 PrintNightmare Vulnerability v1.0.1
© IDIS Co., Ltd. All rights reserved. IDIS and identifying product names and numbers herein are registered trademarks of IDIS Co., Ltd.
All non-IDIS brands and product names are trademarks of their respective companies.
Product appearance, build status and/or specifications are subject to change without notice.
CVE-2021-34527 (Print Nightmare) Vulnerability SN-10
1 Overview
The CVE-2021-34527 vulnerability called ‘Print Nightmare’ in Windows spooler service was revealed on
th
June 9 , 2021 [1]. This document provides a brief introduction to the ‘Print Nightmare’, and the impact of
these attacks on IDIS products.
‘Print Nightmare’ is a bug in the Windows spooler service that under some circumstances can result in an
attacker being able to remotely run code on a Microsoft Windows system as the local SYSTEM user [2].
This means that hackers could exploit ‘Print Nightmare’ to gain elevated administrator privileges and execute
code remotely. In other words, it openly invites hackers to control your PC, install malware and ransomware,
and steal or destroy sensitive data without having to physically access your computer [3].
‘Print Nightmare’ affects all versions of Windows print spooler, including versions installed on Windows OS
based personal computers, enterprise networks, servers, and domain controllers [3].
IDIS standalone products use Linux OS and is not relevant to this vulnerability.
IDIS has the following Windows OS based products and these products are affected by this vulnerability.
(1) IR-100, IR-300(A), DV-2232, DV-3100, ID29/39xx: WES(Windows Embedded Standard) 8, 64bit
Windows print spooler will not accept client connections as a default until an authorized user shares out
a local printer or opens the print queue on a printer connection. But, if user shares out a local printer or
opens the print queue, Windows print spooler will begin accepting client connections and will be exposed
to this vulnerability.
(4) IDIS Center or IDIS Solution Suite: Depending on user server’s Windows OS
Windows printer spooler will be activated and exposed to this vulnerability if this spooler service is not
disabled by user.
Version 1.0.0 2
CVE-2021-34527 (Print Nightmare) Vulnerability SN-10
Please do one of the following to protect your products from this vulnerability.
(1) Download and install the patch software corresponding to the installed Windows OS. (Recommended)
- Windows 10 OS or other OSs : Please refer to Updates section of the MSRC > Customer Guidance
> Security Update Guide > Vulnerabilities > CVE 2021 34527 [4].
Please download and install the appropriate patch software after checking the Windows OS name
and version used in your product.
Press ‘Windows ( ) + R’ keys, enter winver and click OK on ‘Run’ dialog box.
- Option) Please refer to the following site if you want to view installed patch software for Windows.
https://forums.ivanti.com/s/article/How-To-View-Installed-Updates-for-Windows-Using-
WMIC?language=en_US
- Please refer to Workaround section of the MSRC > Customer Guidance > Security Update Guide >
Vulnerabilities > CVE 2021 34527 [4].
- Please refer to Workaround section of the MSRC > Customer Guidance > Security Update Guide >
Vulnerabilities > CVE 2021 34527 [4].
Contact Us
Additional information may be updated in this document in the future. Please contact IDIS HQ via email at
techsupport@idisglobal.com if you have any questions or concerns related to this issue.
Version 1.0.0 3
CVE-2021-34527 (Print Nightmare) Vulnerability SN-10
References
[1] https://cve.mitre.org/
[2] https://www.papercut.com/kb/Main/PrintNightmareCVE2021#what-is-print-nightmare
[3] https://eminetracanada.com/how-to-avoid-windows-print-nightmare-security-threats/213364/
[4] https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-34527
Version History
Version 1.0.0 4