PrintNightmare: Kicking users from Pre-Windows 2000 legacy g

PrintNightmare: Kicking users from Pre-Windows 2000 legacy group may thwart domain controller exploitation


Copy
Another potential mitigation has emerged for the PrintNightmare zero-day vuln, which lets low-privileged users execute code as SYSTEM on Windows domain controllers: remove those people from a backwards-compatibility group.
The zero-day hole came to light earlier this week after an infosec research firm mistakenly published proof-of-concept exploit code for a remote-code execution (RCE) vuln it had nicknamed PrintNightmare. Sangfor Technologies published the exploit for the vulnerability after wrongly believing Microsoft had patched it this month, having read the June Patch Tuesday notes for a remote-code execution vuln in Windows Print Spooler tracked as CVE-2021-1675.
While the patch for CVE-2021-1675 also protects against PrintNightmare on most Windows devices, it didn’t do so for domain controllers, which caused some puzzlement among security researchers. Until today, when Yunhai Zhang of Tianji Lab discovered a potential cause:

Related Keywords

Yunhai Zhang , Dirk Jan Mollema , Benjamin Delpy , Dion Mosley , Infrastructure Agency , Compatible Access Group , Tianji Lab , Microsoft , Sangfor Technologies , June Patch Tuesday , Windows Print Spooler , Access Group , Windows Server , Active Directory , Elevated Token , Microsoft Patch , Windows Print , Window Print Spooler , மைக்ரோசாஃப்ட் , ஜூன் இணைப்பு செவ்வாய் , நுழைவு குழு , ஜன்னல்கள் சேவையகம் , செயலில் அடைவு , மைக்ரோசாஃப்ட் இணைப்பு , ஜன்னல்கள் பிரிண்ட் ,

© 2025 Vimarsana