Hi All,
McAfee is aware of CVE-2021-1675, otherwise known as “PrintNightmare.” Our immediate recommendation is to disable the print spooler service on all servers in your environment. We are investigating product countermeasures, and recommend subscribing to KB94659 - McAfee coverage for June 2021 CVE-2021-1675 PrintNightmare vulnerability for updates.
Solved! Go to Solution.
The work around as described in KB94659:
In response to the identified vulnerability, McAfee has generated an Endpoint Security (ENS) Expert Rule that can prevent exploitation and allow monitoring of this vulnerability. This rule detects when files are written from the spool service into the directory that known exploits are using to drop files on victim systems.
ENS Expert Rule:
Rule {
To disable PrintSpooler through Group Policy Objects (Recommended for servers, except dedicated print servers):
NOTE: Disabling the print spooler service disables the ability to print both locally and remotely.
To block only the remote attack vector, administrators can disable inbound remote printing through Group Policy Objects (Recommended for workstations):
Update:
Update:
IMPORTANT: As of July 6, 2021, Microsoft has released KB5005010, an out-of-band update to address CVE-2021-34257 Remote Code Execution. This update allows organizations to restrict Print Driver installation to Administrator groups exclusively. McAfee recommends customers apply this update as soon as possible.
For more information, see the Microsoft update release article at: KB5005010 - Restricting installation of new printer drivers after applying the July 6, 2021 updates.
The work around as described in KB94659:
In response to the identified vulnerability, McAfee has generated an Endpoint Security (ENS) Expert Rule that can prevent exploitation and allow monitoring of this vulnerability. This rule detects when files are written from the spool service into the directory that known exploits are using to drop files on victim systems.
ENS Expert Rule:
Rule {
To disable PrintSpooler through Group Policy Objects (Recommended for servers, except dedicated print servers):
NOTE: Disabling the print spooler service disables the ability to print both locally and remotely.
To block only the remote attack vector, administrators can disable inbound remote printing through Group Policy Objects (Recommended for workstations):
Hello,
Having implemented the Expert Rule from within one of my Exploit Prevention Rules, is it safe to say that if a detection occurs, that the information would be written to the Threat Event Log with with an Event ID of 20001?
Thank you.
Hi,
Is It possible to exclude legitimate files hashes modifying the expert rule with something like under, to allow installation of printers we use and know :
Rule {
Process {
Include OBJECT_NAME { -v "spoolsv.exe" }
}
Target {
Match FILE {
Exclude MD5 {
-v "xxxxxxxxxxxxxxxxx"
-v "xxxxxxxxxxxxxxxxx"
}
Include OBJECT_NAME { -v "%systemroot%\\System32\\spool\\drivers\\**\\New\\*.dll" }
Include OBJECT_NAME { -v "%systemroot%\\System32\\spool\\drivers\\**\\Old\\*\\*.dll" }
Include -access "CREATE"
}
}
}
Thank you,
best regards
I'm not aware of any reason that shouldn't work, but I've never tested using hash-based exclusions.
Dave
Update:
Update:
IMPORTANT: As of July 6, 2021, Microsoft has released KB5005010, an out-of-band update to address CVE-2021-34257 Remote Code Execution. This update allows organizations to restrict Print Driver installation to Administrator groups exclusively. McAfee recommends customers apply this update as soon as possible.
For more information, see the Microsoft update release article at: KB5005010 - Restricting installation of new printer drivers after applying the July 6, 2021 updates.
Corporate Headquarters
6220 America Center Drive
San Jose, CA 95002 USA