服務(wù)公告
Windows Print Spooler遠(yuǎn)程代碼執(zhí)行0day漏洞預(yù)警 (CVE-2021-34527)
2021-07-02
一、概要
近日,華為云關(guān)注到微軟官方發(fā)布Windows Print Spooler遠(yuǎn)程代碼執(zhí)行0day漏洞(CVE-2021-34527)安全公告,代號PrintNightmare,該漏洞與6月份官方披露的Windows Print Spooler遠(yuǎn)程代碼執(zhí)行漏洞(CVE-2021-1675)類似但不完全相同。攻擊者利用漏洞可繞過RpcAddPrinterDriverEx的安全驗證,并在打印服務(wù)器中安裝惡意的驅(qū)動程序,如果攻擊者所控制的用戶在域中,則攻擊者可以連接到DC中的Spooler服務(wù),并利用該漏洞在DC中安裝惡意的驅(qū)動程序,完全的控制整個域環(huán)境。目前Exp已擴散,風(fēng)險較高。
Windows Print Spooler是Windows的打印機后臺處理程序,廣泛運用于各種內(nèi)網(wǎng)中。華為云提醒使用Windows Print Spooler的用戶及時安排自檢并做好安全加固以降低安全風(fēng)險。
參考鏈接:https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-34527
二、威脅級別
威脅級別:【嚴(yán)重】
(說明:威脅級別共四級:一般、重要、嚴(yán)重、緊急)
三、漏洞影響范圍
影響版本:
Windows Server, version 20H2 (Server Core Installation)
Windows Server, version 2004 (Server Core installation)
Windows Server, version 1909 (Server Core installation)
Windows Server 2019 (Server Core installation)
Windows Server 2019
Windows Server 2016 (Server Core installation)
Windows Server 2016
Windows Server 2012 R2 (Server Core installation)
Windows Server 2012 R2
Windows Server 2012 (Server Core installation)
Windows Server 2012
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)
Windows Server 2008 R2 for x64-based Systems Service Pack 1
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation)
Windows Server 2008 for x64-based Systems Service Pack 2
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation)
Windows Server 2008 for 32-bit Systems Service Pack 2
Windows RT 8.1
Windows 8.1 for x64-based systems
Windows 8.1 for 32-bit systems
Windows 7 for x64-based Systems Service Pack 1
Windows 7 for 32-bit Systems Service Pack 1
Windows 10 Version 21H1 for x64-based Systems
Windows 10 Version 21H1 for ARM64-based Systems
Windows 10 Version 21H1 for 32-bit Systems
Windows 10 Version 20H2 for x64-based Systems
Windows 10 Version 20H2 for ARM64-based Systems
Windows 10 Version 20H2 for 32-bit Systems
Windows 10 Version 2004 for x64-based Systems
Windows 10 Version 2004 for ARM64-based Systems
Windows 10 Version 2004 for 32-bit Systems
Windows 10 Version 1909 for x64-based Systems
Windows 10 Version 1909 for ARM64-based Systems
Windows 10 Version 1909 for 32-bit Systems
Windows 10 Version 1809 for x64-based Systems
Windows 10 Version 1809 for ARM64-based Systems
Windows 10 Version 1809 for 32-bit Systems
Windows 10 Version 1607 for x64-based Systems
Windows 10 Version 1607 for 32-bit Systems
Windows 10 for x64-based Systems
Windows 10 for 32-bit Systems
四、安全建議
1、微軟官方已發(fā)布修復(fù)補丁,受影響用戶可通過官方發(fā)布的補丁進行修復(fù),補丁下載地址:
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-34527
2、若無法及時安裝補丁,可通過以下官方提供的方法進行排查和緩解:
檢查Print Spooler 服務(wù)是否運行(以域管理員身份運行)
Get-Service -Name Spooler
如果Print Spooler服務(wù)正在運行或者未被禁用,可選擇以下方法進行操作(二選一):
方法1、禁用Print Spooler 服務(wù),在powershell中運行如下命令
Stop-Service -Name Spooler -Force
Set-Service -Name Spooler -StartupType Disabled
方法2、通過配置組策略禁用入站遠(yuǎn)程打印。
在組策略編輯器(gpedit.msc)中依次找到管理模板--->打印機,將“允許打印后臺處理程序接受客戶端連接”設(shè)置為禁用。
為確保數(shù)據(jù)安全,建議重要業(yè)務(wù)數(shù)據(jù)進行異地備份。
注:修復(fù)漏洞前請將資料備份,并進行充分測試。