It isn’t yet time to go screaming for the exits, but there’s an important analysis of the CVE-2020-1048 security hole, patched in this month’s Patch T
[See the full post at: On the radar: An exploit for CVE-2020-1048, Windows Print Spooler elevation of privilege]
![]() |
There are isolated problems with current patches, but they are well-known and documented on this site. |
SIGN IN | Not a member? | REGISTER | PLUS MEMBERSHIP |
-
On the radar: An exploit for CVE-2020-1048, Windows Print Spooler elevation of privilege
Home » Forums » Newsletter and Homepage topics » On the radar: An exploit for CVE-2020-1048, Windows Print Spooler elevation of privilege
- This topic has 11 replies, 6 voices, and was last updated 4 years, 9 months ago by
anonymous.
Tags: May 2020 Black Tuesday
AuthorTopicwoody
ManagerMay 13, 2020 at 6:17 pm #2262455Viewing 4 reply threadsAuthorReplies-
anonymous
Guest -
anonymous
GuestMay 14, 2020 at 2:17 pm #2262670I think that I can answer my own question.
After stopping and disabling the Print Spooler service I attempted to run the PowerShell exploit command and it failed due to the service no running.:
PS C:\Users\Administrator> Add-PrinterPort -Name fafdfdsafds
Add-PrinterPort : The spooler service is not reachable. Ensure the spooler service is running.
At line:1 char:1
+ Add-PrinterPort -Name fafdfdsafds
+ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
+ CategoryInfo : NotSpecified: (MSFT_PrinterPortTasks:ROOT/StandardCimv2/MSFT_PrinterPortTasks) [Add-PrinterPort], CimException
+ FullyQualifiedErrorId : HRESULT 0x800706ba,Add-PrinterPortI’m just astounded that this ridiculously easy workaround isn’t mentioned by MS or any of the other sites that I’ve looked at on this vulnerability.
Yeah, you won’t be able to print until you patch, but that’s better than being owned.
Jim
-
anonymous
Guest
-
-
-
DrBonzo
AskWoody PlusMay 14, 2020 at 3:24 pm #2262694 -
OscarCP
MemberMay 14, 2020 at 6:51 pm #2262749DrBonzo,
I think that the one way the bug can be transmitted is via infected emails or from infected Web sites. They might come from crooks sending phishing emails and setting up phony sites to snare the unwary, or from good and trusted correspondents and Web sites with neither side knowing they have been infected and are unwittingly spreading the poison. The main problem seems to be that, once a computer is infected, the bug opens a backdoor that cannot be closed with a patch. So the relevant patches should be applied before this happens, as preventive vaccine and not after the fact remedy.
An interesting twist to this story is that the person who developed a proof-of-concept program posted it, with all relevant information, on GitHub, as I presume many others in the same kind of business do, now and then. It looks like GitHub was massively hacked and many programs of all kinds and their documentation were stolen a few days ago (Alex5723 started a thread on that yesterday). Fortunately, the proof-of-concept of interest here was not among that booty, because it was posted on GitHub just over the last two days. This is Alex’s thread, for the benefit of those who may feel curious about this:
https://www.askwoody.com/forums/topic/microsofts-github-account-has-been-hacked/
Ex-Windows user (Win. 98, XP, 7); since mid-2017 using also macOS. Presently on Monterey 12.15 & sometimes running also Linux (Mint).
MacBook Pro circa mid-2015, 15" display, with 16GB 1600 GHz DDR3 RAM, 1 TB SSD, a Haswell architecture Intel CPU with 4 Cores and 8 Threads model i7-4870HQ @ 2.50GHz.
Intel Iris Pro GPU with Built-in Bus, VRAM 1.5 GB, Display 2880 x 1800 Retina, 24-Bit color.
macOS Monterey; browsers: Waterfox "Current", Vivaldi and (now and then) Chrome; security apps. Intego AV1 user thanked author for this post.
-
-
Paul T
AskWoody MVPMay 15, 2020 at 12:30 am #2262798I think that the one way the bug can be transmitted is via infected emails or from infected Web sites
It’s not that easy. You have to run commands on a machine, either via physical access or persuading the user to run a program, not remotely. This makes it a very low risk unless you are in the habit of running the “latest shiny thing” or leaving your computer unlocked in public.
cheers, Paul
1 user thanked author for this post.
-
anonymous
GuestMay 15, 2020 at 4:29 am #2262815It’s not that easy. You have to run commands on a machine, either via physical access or persuading the user to run a program, not remotely. This makes it a very low risk…
It isn’t that low risk though. You don’t need any escalation of priviledge to make this happen. This could be wrapped up in any number of things that a user could be persuaded to execute. Given that some people will run almost any shiny and/or free stuff that comes their way, that makes it quite a serious vulenrability.
1 user thanked author for this post.
-
mn–
AskWoody LoungerMay 15, 2020 at 9:20 am #2262859You have to run commands on a machine, either via physical access or persuading the user to run a program, not remotely.
Do you mean that isn’t exploitable via PowerShell remoting, Sysinternals PsExec, or the other usual remote admin methods?
I’d like to have that confirmed…
1 user thanked author for this post.
-
woody
Manager
-
-
-
OscarCP
MemberMay 15, 2020 at 3:18 pm #2262984According what the zdnet article says, it opens a backdoor that cannot be closed with a patch. That sounds odd to me, but there it is.
https://www.zdnet.com/article/printdemon-vulnerability-impacts-all-windows-versions/
“On an unpatched system, this will install a persistent backdoor, that won’t go away *even after you patch*,” Ionescu said.”
Ionescu is the one who posted the proof-of-concept and associated documentation on GitHub — fortunately after it was, allegedly, massively hacked and many programs and documents kept there got stolen including, I would imagine, other bugs “proofs of concept.” (See link to the relevant thread and, from there, to the article about this in my previous comment.)
Ex-Windows user (Win. 98, XP, 7); since mid-2017 using also macOS. Presently on Monterey 12.15 & sometimes running also Linux (Mint).
MacBook Pro circa mid-2015, 15" display, with 16GB 1600 GHz DDR3 RAM, 1 TB SSD, a Haswell architecture Intel CPU with 4 Cores and 8 Threads model i7-4870HQ @ 2.50GHz.
Intel Iris Pro GPU with Built-in Bus, VRAM 1.5 GB, Display 2880 x 1800 Retina, 24-Bit color.
macOS Monterey; browsers: Waterfox "Current", Vivaldi and (now and then) Chrome; security apps. Intego AV-
This reply was modified 5 years ago by
OscarCP.
1 user thanked author for this post.
-
This reply was modified 5 years ago by
-
anonymous
GuestAugust 8, 2020 at 12:46 pm #2287164Hi first post registered because of this thread how gnarly I think this exploit is and the knowledgeable folks talking here I like it.
Anywho was reading in an article the Stuxnet virus used the print spooler elivation and that was ten years ago and it hasn’t been changed.
It’s a problem even if your hard drive is encrypted if you’re on windows and dumb enough to get phished into playing yourself, it seems like with the right social engineering and the right “pigeon” it could be doing a ton of damage. I wonder why it never was changed?
Viewing 4 reply threads - This topic has 11 replies, 6 voices, and was last updated 4 years, 9 months ago by
-

Plus Membership
Donations from Plus members keep this site going. You can identify the people who support AskWoody by the Plus badge on their avatars.
AskWoody Plus members not only get access to all of the contents of this site -- including Susan Bradley's frequently updated Patch Watch listing -- they also receive weekly AskWoody Plus Newsletters (formerly Windows Secrets Newsletter) and AskWoody Plus Alerts, emails when there are important breaking developments.
Get Plus!
Welcome to our unique respite from the madness.
It's easy to post questions about Windows 11, Windows 10, Win8.1, Win7, Surface, Office, or browse through our Forums. Post anonymously or register for greater privileges. Keep it civil, please: Decorous Lounge rules strictly enforced. Questions? Contact Customer Support.
Search Newsletters
Search Forums
View the Forum
Search for Topics
Recent Topics
-
Office gets current release
by
Susan Bradley
22 minutes ago -
FBI: Still Using One of These Old Routers? It’s Vulnerable to Hackers
by
Alex5723
15 hours, 33 minutes ago -
Windows AI Local Only no NPU required!
by
RetiredGeek
4 minutes ago -
Stop the OneDrive defaults
by
CWBillow
16 hours, 22 minutes ago -
Windows 11 Insider Preview build 27868 released to Canary
by
joep517
1 day, 2 hours ago -
X Suspends Encrypted DMs
by
Alex5723
1 day, 4 hours ago -
WSJ : My Robot and Me AI generated movie
by
Alex5723
1 day, 4 hours ago -
Botnet hacks 9,000+ ASUS routers to add persistent SSH backdoor
by
Alex5723
1 day, 5 hours ago -
OpenAI model sabotages shutdown code
by
Cybertooth
1 day, 6 hours ago -
Backup and access old e-mails after company e-mail address is terminated
by
M W Leijendekker
18 hours, 11 minutes ago -
Enabling Secureboot
by
ITguy
1 day, 1 hour ago -
Windows hosting exposes additional bugs
by
Susan Bradley
1 day, 13 hours ago -
No more rounded corners??
by
CWBillow
1 day, 9 hours ago -
Android 15 and IPV6
by
Win7and10
23 hours, 30 minutes ago -
KB5058405 might fail to install with recovery error 0xc0000098 in ACPI.sys
by
Susan Bradley
2 days, 2 hours ago -
T-Mobile’s T-Life App has a “Screen Recording Tool” Turned on
by
Alex5723
2 days, 4 hours ago -
Windows 11 Insider Preview Build 26100.4202 (24H2) released to Release Preview
by
joep517
1 day, 23 hours ago -
Windows Update orchestration platform to update all software
by
Alex5723
2 days, 12 hours ago -
May preview updates
by
Susan Bradley
1 day, 23 hours ago -
Microsoft releases KB5061977 Windows 11 24H2, Server 2025 emergency out of band
by
Alex5723
1 day, 15 hours ago -
Just got this pop-up page while browsing
by
Alex5723
2 days, 4 hours ago -
KB5058379 / KB 5061768 Failures
by
crown
2 days, 1 hour ago -
Windows 10 23H2 Good to Update to ?
by
jkitc
1 day, 3 hours ago -
At last – installation of 24H2
by
Botswana12
3 days, 3 hours ago -
MS-DEFCON 4: As good as it gets
by
Susan Bradley
1 hour, 33 minutes ago -
RyTuneX optimize Windows 10/11 tool
by
Alex5723
3 days, 16 hours ago -
Can I just update from Win11 22H2 to 23H2?
by
Dave Easley
1 day, 14 hours ago -
Limited account permission error related to Windows Update
by
gtd12345
4 days, 5 hours ago -
Another test post
by
gtd12345
4 days, 5 hours ago -
Connect to someone else computer
by
wadeer
6 hours, 53 minutes ago
Recent blog posts
Key Links
Want to Advertise in the free newsletter? How about a gift subscription in honor of a birthday? Send an email to sb@askwoody.com to ask how.
Mastodon profile for DefConPatch
Mastodon profile for AskWoody
Home • About • FAQ • Posts & Privacy • Forums • My Account
Register • Free Newsletter • Plus Membership • Gift Certificates • MS-DEFCON Alerts
Copyright ©2004-2025 by AskWoody Tech LLC. All Rights Reserved.