MS Print Spooler vulnerability

Follow
    Applies to:
  • SecureAuth Identity Platform
  • Legacy SecureAuth IdP
Deployment model:
  • Cloud
  • Hybrid
  • On Premises
  • Version Affected:  All

    Description:  

    Microsoft has announced a vulnerability in their Print Spooler service

    https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-34527

     

    Cause:  

    MS vulnerability

     

    Resolution:  

    The IdP has no need for the Print Spooler service to be running. We recommend that you disable the service as per the MS article above to protect your IdP. 

     

    Special Considerations:  

    The following Powershell will enable logging for that service so that if something does happen, there is a potential trail. It will also disable the Service.

     

    $spoolerLog = Get-LogProperties 'Microsoft-Windows-PrintService/Operational'
    if ($spoolerLog.Enabled -eq $false) {
    $spoolerLog.Enabled = $true
    Set-LogProperties -LogDetails $spoolerLog
    }$status = get-service -name spooler | select-object Status -ExpandProperty Status
    if ($status -eq "Running") {
    stop-service -Name spooler
    set-service -name spooler -status stopped -startupType disabled
    }

     

     

    SecureAuth Knowledge Base Articles provide information based on specific use cases and may not apply to all appliances or configurations. Be advised that these instructions could cause harm to the environment if not followed correctly or if they do not apply to the current use case.

    Customers are responsible for their own due diligence prior to utilizing this information and agree that SecureAuth is not liable for any issues caused by misconfiguration directly or indirectly related to SecureAuth products.

    0 out of 0 found this helpful

    Comments

    0 comments

    Please sign in to leave a comment.