New Windows Server PrintNightmare Zero-day exploit may be the new Hafnium

Reading time icon 1 min. read


Readers help support MSpoweruser. We may get a commission if you buy through our links. Tooltip Icon

Read our disclosure page to find out how can you help MSPoweruser sustain the editorial team Read more

A new and unpatched Zero-day exploit has just been released, along with Proof-of-Concept code, which grants attackers full RemoteĀ  Code Execution capabilities on fully patched Windows Print Spooler devices.

The hack, called PrintNightmare, was accidentally released by Chinese security company Sangfor, who confused it with a similar Print Spooler exploit which Microsoft has already patched.

PrintNightmare however is effective on fully patched Windows Server 2019 machines and allows attacker code to run with full privileges.

The main mitigating factor is that hackers need some (even low-privilege) credentials for the network, but for enterprise networks, these can be easily purchased for around $3.

This means corporate networks are again extremely vulnerable to (especially ransomware) attacks, with security researchers recommending companies disable their Windows Print Spoolers.

Read more about the issue at BleepingComputer here.

User forum

0 messages