cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
Announcements

Orbital Query Corner - Two Views of PrintNightmare

1810
Views
10
Helpful
0
Comments

Part 1: The Basics

Hard-copy printing may feel very “old school” now, but a recent flurry of activity related to the print spooler service on Windows operating systems has brought one of the oldest IT applications back into the spotlight again.  Our Talos team has a detailed discussion in their blog post titled “PrintNightmare: Here’s what you need to know and Talos’ coverage”. [1]  

Microsoft’s guidance for the issue is titled “Windows Print Spooler Remote Code Execution Vulnerability”, [2] for CVE-2021-34527.

Since this vulnerability is being actively exploited, of course now is an excellent time to devote a bit of attention to figuring out where in our environments we might have this service enabled.  And, of course, an Orbital search is a quick way of getting an answer to that question.  In Orbital’s catalog of prebuilt queries, there’s a very convenient generic search for Windows services.

pn01 catalog services.png

 

In the catalog description for this search, take note of the cautionary text:

pn02 query caution.png

 

Fortunately, the query is built to make it easy to restrict the scope with an additional parameter.  Here’s how that looks.

pn03 spooler param.png

 

We enter “spooler” in the “Service Name” field, and the Catalog query will automatically pick that up when it runs.  (In fact, the hardest part of this entire enumeration exercise may be knowing that Microsoft Windows uses the word “spooler” as the name for the Print Spooler service.)  In the results, any systems that show up with the service status “Enabled” are potential targets for this vulnerability.  If the system in question doesn’t need it, then the service should be disabled.  The “Principle of Least Privilege” [3] is, after all, still excellent security advice: the bad guys can’t exploit something that’s not there.

Part 2: What If Things Aren't So Simple

Ah, but what if we have an endpoint – even a high-value endpoint, like maybe a server running financial applications – that still needs to run print services, at least locally?  Well, for those cases, Microsoft’s recommendation [4] is to apply a Group Policy Object (GPO) to prevent the Spooler service from accepting inbound remote printing jobs.

pn04 mitigation.png

So, getting back to Orbital, it’s easy to check if the first mitigation option has been applied to a system; just re-run the services query above and verify that the service state is now “Disabled”.  But what about the GPO setting in the second option?  Can we verify that in Orbital, too?

 

Of course we can.  All we need is the right path for a custom query against the registry, and here it is:

SELECT key as reg_key, path, name, data, datetime(mtime,"unixepoch","UTC") AS last_modified FROM registry WHERE key = "HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows NT\Printers\" AND name = "RegisterSpoolerRemoteRpcEndPoint";

 

Here’s what the results from one such query look like:

pn05 gpo query.png

 

Notice that, for this test, we didn’t even bother with the name = "RegisterSpoolerRemoteRpcEndPoint" part.  That’s because, in a typical environment, there won’t be a lot of printing-related GPOs configured in the first place.  And, as you can see in the following screen capture from gpedit on our test system, “Not configured” in this case would mean that the system is, by default, willing to accept remote client connections (and therefore potentially vulnerable).  The data value of “2” in our Orbital results means “Disabled”, so this confirms that the GPO mitigation has been applied here.

pn06 gpedit.png

 

Reference Links

[1] https://blog.talosintelligence.com/2021/07/printnightmare-coverage.html

[2] https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-34527

[3] https://csrc.nist.gov/glossary/term/principle_of_least_privilege

[4] https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-34527#workarounds

 

 

Content for Community-Ad