Microsoft addresses critical elevation of privilege vulnerability in Windows Print Spooler affecting multiple versions.
Microsoft has released security updates to address a critical vulnerability in the Windows Print Spooler service. The vulnerability, tracked as CVE-2023-23397, could allow an attacker to elevate privileges on affected systems.
The Windows Print Spooler vulnerability has a CVSS score of 7.8 (High). Attackers could exploit this vulnerability by sending specially crafted requests to the Print Spooler service. Successful exploitation could result in elevation of privilege, allowing an attacker to take control of the affected system.
Affected products include:
- Windows 10 Version 21H2
- Windows 11 Version 22H2
- Windows Server 2022
- Windows Server 2019
- Windows Server 2016
Microsoft released security updates on June 13, 2023, as part of the monthly Patch Tuesday cycle. Organizations should prioritize deploying these updates to critical systems as soon as possible.
Mitigation steps:
- Apply the latest security updates immediately
- Restrict access to the Print Spooler service
- Monitor for unusual print-related activity
- Implement principle of least privilege for user accounts
For detailed information about the vulnerability, refer to the Microsoft Security Advisory CVE-2023-23397.
Organizations unable to immediately patch should consider disabling the Print Spooler service as a temporary workaround. However, this may impact printing functionality across the network.
The vulnerability was discovered by security researchers at Tenable, who responsibly reported it to Microsoft through their vulnerability coordination program.
Comments
Please log in or register to join the discussion