CVE-2021-1678
vulnerability analysis and mitigation

Overview

CVE-2021-1678 is a Windows Print Spooler Spoofing Vulnerability discovered by CrowdStrike researchers and patched by Microsoft on January 12, 2021. This security bypass vulnerability exists in the way the Printer Remote Procedure Call (RPC) binding handles authentication for the remote Winspool interface (Microsoft Support, CrowdStrike Blog).

Technical details

The vulnerability allows an attacker to relay NTLM authentication sessions to an attacked machine and use a printer spooler MSRPC interface to remotely execute code. The issue stems from an insecure authentication level on the IRemoteWinSpool MSRPC interface, which accepts the authentication level of RPCCAUTHNLEVELCONNECT that only authenticates the initial request without enforcing encryption or signing on transferred commands (CrowdStrike Blog).

Impact

When successfully exploited, this vulnerability enables attackers to relay NTLM authentication sessions and potentially achieve remote code execution on the targeted system through the printer spooler MSRPC interface. This could allow lateral movement within networks and unauthorized access to systems (CrowdStrike Blog).

Mitigation and workarounds

Microsoft released patches on January 12, 2021, implementing a two-phase deployment strategy. The initial phase requires installing Windows updates and enabling Enforcement mode by setting the RpcAuthnLevelPrivacyEnabled registry value to 1 in HKEYLOCALMACHINE\SYSTEM\CurrentControlSet\Control\Print. The enforcement phase, starting September 14, 2021, enforces these changes by default. Organizations should also configure secure NTLM settings, track NTLM usage, and implement detection mechanisms for NTLM relay attacks (Microsoft Support).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management