PrintNightmare Prevention Update with Cortex XDR

Jul 15, 2021
2 minutes
129 views

Microsoft recently warned Windows users about two vulnerabilities, CVE-2021-1675 & CVE 2021-34527, affecting the Windows Print Spooler Service. Proof-of-concept exploit code was posted on Github before the vulnerabilities were fully patched.

The incident, dubbed by the security community as "PrintNightmare," allows threat actors to exploit remote code execution (RCE) vulnerabilities and run arbitrary code with system privileges.

Palo Alto Networks recommends that Windows users update their operating systems as soon as possible to patch the vulnerabilities. Organizations can also block PrintNightmare exploits with Cortex XDR; read on to learn how.

Cortex XDR Response

Cortex XDR agent 7.4.1 with content version 189-64538 and above is capable of preventing all currently known implementations of the exploits on vulnerable hosts, including patched hosts with the “Point and Print” feature enabled.

What the user should expect when running Cortex XDR agent 7.4.1:

 

Alert from a patched Microsoft Windows host:

Alert from a patched Microsoft Windows host

Figure 1: A PrintNightmare alert in the Cortex XDR Alerts table. Cortex XDR detected an exploit attempt that was blocked by the Windows patch.

An alert card showing a detected exploit attempt.

Figure 2: An alert card showing a detected exploit attempt.

 

Alert from an unpatched Microsoft Windows host:

Alert from an unpatched Microsoft Windows host

Figure 3: Cortex XDR blocked the malicious RPC operation.

An alert card showing a blocked exploit attempt.

Figure 4: An alert card showing a blocked exploit attempt.

Distinguishing between local and remote exploits

Note that the difference between the two cases will be seen in the “initiated by” field. For a local case, you will see a process name on the machine; for a remote case, you will see an IP address for a machine inside your network.

Alert Severity

When alerting on an exploitation attempt targeting a patched machine, Cortex XDR usually labels these alerts as “low” severity. In this case, Cortex XDR will rate the patched machine alerts as high severity since an attacker is already inside your network (for the RCE case) or even on your machine (for the local privilege escalation case). We highly recommend investigating those alerts and not ignoring them even if the machine is already patched.

References & Additional Information

 


Subscribe to Security Operations Blogs!

Sign up to receive must-read articles, Playbooks of the Week, new feature announcements, and more.