12/08/21
A remote code execution vulnerability exists when the Windows Print Spooler service improperly performs privileged file operations. An attacker who successfully exploits this vulnerability could run arbitrary code with SYSTEM privileges. An attacker could then install programs; view, change, or delete data; or create accounts with full user rights.
Illumina recommends that customers immediately disable their printer spooler service using the instructions in the Workaround section below.
As of July 7, 2021, the security updates for Windows Server 2012, Windows Server 2016, and Windows 10, Version 1607 have been released. Refer to the Security Updates table in CVE-2021-34527 for the update applicable to your system.
Microsoft has released security updates to address this vulnerability. Illumina is evaluating the impact of the official Microsoft patches on the performance of Illumina Windows-based products. Until that impact testing is complete, Illumina recommends that customers immediately disable their printer spooler service (see Workaround section below).
NOTE: The security updates released on and after July 6, 2021 contain protections for CVE-2021-1675 and protections for an additional remote code execution exploit in the Windows Print Spooler service known as “PrintNightmare”, documented in CVE-2021-34527.
Workaround
NOTE: Having NoWarningNoElevationOnInstall set to 1, by design, makes your system vulnerable to attack.
2. Determine if the Print Spooler service is running:
3. If the Print Spooler is running or if the service is not set to disabled, select one of the following options to either disable the Print Spooler service, or disable inbound remote printing through Group Policy:
Impact of workaround: Disabling the Print Spooler service disables the ability to print both locally and remotely.
Impact of workaround: This policy will block the remote attack vector by preventing inbound remote printing operations. The system will no longer function as a print server, but local printing to a directly attached device will still be possible.
For more information, refer to Use Group Policy settings to control printers.
Refer to the FAQ and Workaround sections in the Microsoft Common Vulnerabilities and Exposures (CVE) CVE-2021-34527 for more information on how to help protect your system from this vulnerability until the patch can be tested. See also KB5005010: Restricting installation of new printer drivers after applying the July 6, 2021 updates.
For additional questions, contact techsupport@illumina.com.