

The following GPO can be set to deny client connections to the spooler, which is a potential work around where disabling the spooler service altogether might not be an option. It has been confirmed that the GPO fixes both the MS-RPRN RpcAddPrinterDriverEx function & Win32 AddPrinterDriverEx function that SharpPrintNightmare uses.
Spooler event id 1000 how to#
Here's how to do it on both GPO and PowerShell. The patch released by Microsoft in June 2021 does patch CVE-2021-1675 but it does not unfortunately fix the issue known as PrintNighmare(CVE-2021-34527), therefore a workaround fix can be applied by disabling the printer spooler service.
Spooler event id 1000 drivers#

Thanks to Benjamin Delpy, there is an updated flow chart on the exploitability of this issue to determine if your systems are likely vulnerable. We've written up a blog post explaining the content of this repo and the information found. Please test all recommended fixes before rolling out to production as there may be unintended consequences as a result of these hardening changes. Please note that these rules may be circumvented - please patch as appropriate and disable the printer spooler service on domain controllers. This repo contains an EVTX sample of the CVE-2021-1675 & CVE-2021-34527 attack as well as a minimal Sysmon configuration file that can be used to generate the relevant telemetry. Therefore the workarounds listed below are still recommended. The patch has been confirmed to fix RCE however local priviledge escalation appears to not be patched as of yet. From Lares Labs: Detection & Remediation Information for CVE-2021-1675 & CVE-2021-34527 🚨 Patch released:
