• Language chooser
    • USA (English)
    • France (Français)

Microsoft PrintNightmare Vulnerability

Released: Mar 16, 2022


Critical Severity

Microsoft Vendor

Vulnerability Type


Public 0-day exploit allows domain takeover

A remote code execution vulnerability exists in Windows OS when the Windows Print Spooler service improperly performs privileged file operations. An attacker who successfully exploited this vulnerability could run arbitrary code with SYSTEM privileges. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Microsoft is encouraging customers to either "Disable the Print Spooler service" or "Disable inbound remote printing through Group Policy". Learn More »

Common Vulnerabilities and Exposures

CVE-2021-34527

Background

On June 30, it was disclosed that the technical details and a proof-of-concept (PoC) exploit have been accidentally leaked for a currently unpatched vulnerability in Windows that allows remote code execution. Despite the need for authentication, the severity of the issue is critical as threat actors can use it to take over a Windows domain server to easily deploy malware across a company’s network. The issue affects Windows Print Spooler and the researchers named it PrintNightmare.

Latest Development

Recent news and incidents related to cybersecurity threats encompassing various events such as data breaches, cyber-attacks, security incidents, and vulnerabilities discovered.


June 30: Initial details emerge
https://www.bleepingcomputer.com/news/security/public-windows-printnightmare-0-day-exploit-allows-domain-takeover/


March 15, 2022 - CISA reported that Russian state sponsored hackers have exploited this vulnerability in combination with default Mutli-Factor Authentication protocols to gain access to cloud and email accounts for document exfiltration. -
https://www.cisa.gov/uscert/ncas/alerts/aa22-074a
July 7, 2021- Full patch / fix released -
https://www.bleepingcomputer.com/news/security/microsoft-printnightmare-now-patched-on-all-windows-versions/
July 6, 2021 - Microsoft released a security patch (found later to be a partial fix) -
https://us-cert.cisa.gov/ncas/current-activity/2021/07/06/microsoft-releases-out-band-security-updates-printnightmare
July 2, 2021 - Microsoft is investigating the vulnerability and assigned a CVE to the vulnerability -
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-34527

FortiGuard Cybersecurity Framework

Mitigate security threats and vulnerabilities by leveraging the range of FortiGuard Services.


PROTECT
  • Decoy VM

  • Vulnerability

  • IPS

DETECT
  • Outbreak Detection

  • Threat Hunting

RESPOND
  • Assisted Response Services

  • Automated Response

RECOVER
  • NOC/SOC Training

  • End-User Training

IDENTIFY
  • Vulnerability Management

  • Attack Surface Hardening

  • Inventory Management

  • Business Reputation

Threat Intelligence

Information gathered from analyzing ongoing cybersecurity events including threat actors, their tactics, techniques, and procedures (TTPs), indicators of compromise (IOCs), malware and related vulnerabilities.


Loading ...

Indicators of compromise Indicators of compromise
IOC Indicator List
Indicator Type Status
2e6f9a48d854add9f895a3737fa5fcc9d38d082466765e5... file Active
45942ad78a041108de18a9661ea1067b21e6c041 file Active
0306b0b79a85711605bbbfac62ac7d040a556aa7ac9fe58... file Active
419da91566a7b1e5720792409301fa772d9abf24dfc3ddd... file Active
6a348a5b13335e453ac34b0ed87e37a153c76a5be528a4e... file Active
4e80fa124865445719e66d917defd9c8ed3bd436162e3fb... file Active
217f21bd9d5e92263e3a903cfcea0e6a1d4c3643eed2230... file Active
failsum.fun domain Active
flewmen.tech domain Active
flysex.space domain Active
printnightmare.gentilkiwi.com domain Active
185.18.52.155 ip Active
10b9b1d8f6bafd9bb57ccfb1da4a658f10207d566781fa5... file Active
66c4f54da6542339de036872e80306f345b8572a71e7824... file Active
http://747c0a08a414eae0b808dstzaaeww.xurvsjipiy... url Active
747c0a08a414eae0b808dstzaaeww.xurvsjipiyubcsta.onion domain Inactive
xurvsjipiyubcsta.onion domain Inactive
http://747c0a08a414eae0b808dstzaaeww.laygive.si... url Active
http://747c0a08a414eae0b808dstzaaeww.loglook.cl... url Active
http://747c0a08a414eae0b808dstzaaeww.tankmy.spa... url Active
http://747c0a08a414eae0b808dstzaaeww.gorise.uno... url Active
747c0a08a414eae0b808dstzaaeww.laygive.site domain Active
747c0a08a414eae0b808dstzaaeww.loglook.club domain Active
747c0a08a414eae0b808dstzaaeww.tankmy.space domain Active
747c0a08a414eae0b808dstzaaeww.gorise.uno domain Active
laygive.site domain Active
loglook.club domain Active
tankmy.space domain Active
gorise.uno domain Active
fitsour.top domain Active
freewho.space domain Active
l5nmxg2syswnc6s3724evnip5uktj7msy3pgowkbcidbei3... domain Active
uponmix.xyz domain Active
partscs.site domain Active
codehes.uno domain Active
0e65657740d7f06acda53b7d3190f9728801b984d5bd6cc... file Active
a2302ae795c24392fbfac47a983cf9305f94f0d0bec557d... file Active
157.230.81.39 ip Active
173.239.198.46 ip Active
191.96.121.162 ip Active
45.32.137.94 ip Active
dfa32d8ed7c429b020c0581148a55bc752c35834d7a2b1b... file Active
1719cf6341b7ef28d39ec21c046b0a7adaad97add862283... file Active
c1d1402226179c66570d66290dff2238b6a9f918c81267a... file Active
09ci1v1c845e5bbe.freewho.space domain Active
13heb2x46a2f3r3.flewmen.tech domain Active
14fo5cicjbfb6kb.fitsour.top domain Active
2bf4ce637gcifn.getsbad.site domain Active
3e37b9e42fb14079b16c96cde72b01aba4859d93531cad1... file Active
423v5e3i27c.fitsour.top domain Active
4e799cfae34e1f64633f32b35bc4aa9af6696c552870a75... file Active
6f91b25d9e2c0315dd6198d86c7f4006ad836be3e757cdd... file Active
6qay44e0ffc0se.failsum.fun domain Active
6z8ocdn170r05x55.freewho.space domain Active
c0f95af52e538164e9f47d854843a46743418587cb998e9... file Active
cfdyc4b8b3d3s38p1r.failsum.fun domain Active
eb4bccb4905f858a06c2f3ba3fa1af33629e42353160149... file Active
fac0c1mb1d32van.getsbad.site domain Active
getsbad.site domain Active
http://09ci1v1c845e5bbe.freewho.space/ url Active
http://13heb2x46a2f3r3.flewmen.tech/ url Active
http://14fo5cicjbfb6kb.fitsour.top/ url Active
http://2bf4ce637gcifn.getsbad.site/ url Active
http://423v5e3i27c.fitsour.top/ url Active
http://6qay44e0ffc0se.failsum.fun/ url Active
http://6z8ocdn170r05x55.freewho.space/ url Active
http://cfdyc4b8b3d3s38p1r.failsum.fun/ url Active
http://fac0c1mb1d32van.getsbad.site/ url Active
ofideas.uno domain Inactive
Indicators of compromise Indicators of compromise
IOC Threat Activity

Last 30 days

Chg

Avg 0