A new, unpatched, vulnerability has been discovered in the Windows Print Spooler and is being tracked under CVE-2021-34481. Discovered by Jacob Baines at Dragos, this one requires local access, so it is less of a nightmare than PrintNightmare, but unfortunately the result of exploitation is SYSTEM level privileges.
Unfortunately, the workaround is the same; Stop and disable the Print Spooler service, which, of course, will disable the ability to print, both locally, and remotely.
It appears that Jacob will not be providing more details until Def Con.
At this point there is no indication of whether or not Microsoft will be releasing an out of band patch for this vulnerability.
— Rick Wanner MSISE – rwanner at isc dot sans dot edu – Twitter:namedeplume (Protected)
(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
Source: Read More (SANS Internet Storm Center, InfoCON: green)