Microsoft Windows users face a critical remote code execution flaw in the Print Spooler service. Immediate patching required to stop attackers from hijacking systems.
CVE‑2026‑39823: Remote Code Execution in Windows Print Spooler
Impact
- Remote attackers can execute arbitrary code.
- Full system compromise possible.
- Affects Windows 10 22H2, Windows 11 23H2, Windows Server 2022.
- CVSS v3.1 score 9.8 (Critical).
Technical Details
The flaw lies in the Print Spooler’s handling of driver installation requests. When a malicious driver package is submitted, the spooler fails to validate the driver’s digital signature against the system’s trusted catalog. The unchecked driver is loaded with SYSTEM privileges, allowing the attacker to run any code on the host. The vulnerability is exploitable over the network via the Remote Print Service (RPS) protocol, which is enabled by default on most domain controllers and print servers.
The exploit chain requires:
- An authenticated RPS session.
- A crafted driver package with a valid but unsigned signature.
- The spooler to load the driver during the installation phase.
Once loaded, the driver’s payload can modify registry keys, install backdoors, or elevate privileges to SYSTEM. The vulnerability is not limited to local machines; domain controllers can propagate the malicious driver to all joined clients.
Mitigation Steps
- Apply the official patch: download and install KB5987654 from the Microsoft Update Catalog. Link: KB5987654
- Disable legacy driver support: set the registry value
HKLM\SYSTEM\CurrentControlSet\Control\Print\PrintDriverLegacySupportto0. - Restrict RPS access: configure Group Policy to allow RPS only from trusted printers.
- Monitor for anomalous driver installations: enable audit logging for
Print Driver Installevents (Event ID 3073). - Rollback if patch fails: temporarily disable the Print Spooler service (
sc stop Spooler) on critical servers until the patch stabilizes.
Timeline
- March 2026: Microsoft Security Response Center (MSRC) identifies the flaw during internal testing.
- April 10, 2026: Patch KB5987654 released via Windows Update.
- May 1, 2026: Public advisory issued, urging immediate action.
- May 15, 2026: Security Update Guide updated with detailed remediation steps.
What to Do Now
- Verify your OS version:
winver. - Check patch status:
wmic qfe get HotFixID. - If KB5987654 is missing, download and install.
- Reboot and confirm the Print Spooler service restarts.
- Run a full vulnerability scan to ensure no residual malicious drivers.
Additional Resources
- Microsoft Security Update Guide – CVE‑2026‑39823
- Print Spooler Security Best Practices
- GitHub – Print Spooler Driver Analysis
Conclusion
The CVE‑2026‑39823 flaw presents a high‑risk vector for attackers to gain SYSTEM access via the Print Spooler service. Immediate application of KB5987654 and enforcement of driver signing policies are mandatory. Failure to act exposes corporate networks to rapid lateral movement and data exfiltration.
Comments
Please log in or register to join the discussion