It isn’t yet time to go screaming for the exits, but there’s an important analysis of the CVE-2020-1048 security hole, patched in this month’s Patch T
[See the full post at: On the radar: An exploit for CVE-2020-1048, Windows Print Spooler elevation of privilege]
![]() |
Patch reliability is unclear. Unless you have an immediate, pressing need to install a specific patch, don't do it. |
SIGN IN | Not a member? | REGISTER | PLUS MEMBERSHIP |
-
On the radar: An exploit for CVE-2020-1048, Windows Print Spooler elevation of privilege
Home » Forums » Newsletter and Homepage topics » On the radar: An exploit for CVE-2020-1048, Windows Print Spooler elevation of privilege
- This topic has 11 replies, 6 voices, and was last updated 4 years, 10 months ago by
anonymous.
Tags: May 2020 Black Tuesday
AuthorTopicwoody
ManagerMay 13, 2020 at 6:17 pm #2262455Viewing 4 reply threadsAuthorReplies-
anonymous
Guest -
anonymous
GuestMay 14, 2020 at 2:17 pm #2262670I think that I can answer my own question.
After stopping and disabling the Print Spooler service I attempted to run the PowerShell exploit command and it failed due to the service no running.:
PS C:\Users\Administrator> Add-PrinterPort -Name fafdfdsafds
Add-PrinterPort : The spooler service is not reachable. Ensure the spooler service is running.
At line:1 char:1
+ Add-PrinterPort -Name fafdfdsafds
+ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
+ CategoryInfo : NotSpecified: (MSFT_PrinterPortTasks:ROOT/StandardCimv2/MSFT_PrinterPortTasks) [Add-PrinterPort], CimException
+ FullyQualifiedErrorId : HRESULT 0x800706ba,Add-PrinterPortI’m just astounded that this ridiculously easy workaround isn’t mentioned by MS or any of the other sites that I’ve looked at on this vulnerability.
Yeah, you won’t be able to print until you patch, but that’s better than being owned.
Jim
-
anonymous
Guest
-
-
DrBonzo
AskWoody PlusMay 14, 2020 at 3:24 pm #2262694-
OscarCP
MemberMay 14, 2020 at 6:51 pm #2262749DrBonzo,
I think that the one way the bug can be transmitted is via infected emails or from infected Web sites. They might come from crooks sending phishing emails and setting up phony sites to snare the unwary, or from good and trusted correspondents and Web sites with neither side knowing they have been infected and are unwittingly spreading the poison. The main problem seems to be that, once a computer is infected, the bug opens a backdoor that cannot be closed with a patch. So the relevant patches should be applied before this happens, as preventive vaccine and not after the fact remedy.
An interesting twist to this story is that the person who developed a proof-of-concept program posted it, with all relevant information, on GitHub, as I presume many others in the same kind of business do, now and then. It looks like GitHub was massively hacked and many programs of all kinds and their documentation were stolen a few days ago (Alex5723 started a thread on that yesterday). Fortunately, the proof-of-concept of interest here was not among that booty, because it was posted on GitHub just over the last two days. This is Alex’s thread, for the benefit of those who may feel curious about this:
https://www.askwoody.com/forums/topic/microsofts-github-account-has-been-hacked/
Ex-Windows user (Win. 98, XP, 7); since mid-2017 using also macOS. Presently on Monterey 12.15 & sometimes running also Linux (Mint).
MacBook Pro circa mid-2015, 15" display, with 16GB 1600 GHz DDR3 RAM, 1 TB SSD, a Haswell architecture Intel CPU with 4 Cores and 8 Threads model i7-4870HQ @ 2.50GHz.
Intel Iris Pro GPU with Built-in Bus, VRAM 1.5 GB, Display 2880 x 1800 Retina, 24-Bit color.
macOS Monterey; browsers: Waterfox "Current", Vivaldi and (now and then) Chrome; security apps. Intego AV1 user thanked author for this post.
Paul T
AskWoody MVPMay 15, 2020 at 12:30 am #2262798I think that the one way the bug can be transmitted is via infected emails or from infected Web sites
It’s not that easy. You have to run commands on a machine, either via physical access or persuading the user to run a program, not remotely. This makes it a very low risk unless you are in the habit of running the “latest shiny thing” or leaving your computer unlocked in public.
cheers, Paul
1 user thanked author for this post.
-
anonymous
GuestMay 15, 2020 at 4:29 am #2262815It’s not that easy. You have to run commands on a machine, either via physical access or persuading the user to run a program, not remotely. This makes it a very low risk…
It isn’t that low risk though. You don’t need any escalation of priviledge to make this happen. This could be wrapped up in any number of things that a user could be persuaded to execute. Given that some people will run almost any shiny and/or free stuff that comes their way, that makes it quite a serious vulenrability.
1 user thanked author for this post.
-
mn–
AskWoody LoungerMay 15, 2020 at 9:20 am #2262859You have to run commands on a machine, either via physical access or persuading the user to run a program, not remotely.
Do you mean that isn’t exploitable via PowerShell remoting, Sysinternals PsExec, or the other usual remote admin methods?
I’d like to have that confirmed…
1 user thanked author for this post.
-
woody
Manager
-
OscarCP
MemberMay 15, 2020 at 3:18 pm #2262984According what the zdnet article says, it opens a backdoor that cannot be closed with a patch. That sounds odd to me, but there it is.
https://www.zdnet.com/article/printdemon-vulnerability-impacts-all-windows-versions/
“On an unpatched system, this will install a persistent backdoor, that won’t go away *even after you patch*,” Ionescu said.”
Ionescu is the one who posted the proof-of-concept and associated documentation on GitHub — fortunately after it was, allegedly, massively hacked and many programs and documents kept there got stolen including, I would imagine, other bugs “proofs of concept.” (See link to the relevant thread and, from there, to the article about this in my previous comment.)
Ex-Windows user (Win. 98, XP, 7); since mid-2017 using also macOS. Presently on Monterey 12.15 & sometimes running also Linux (Mint).
MacBook Pro circa mid-2015, 15" display, with 16GB 1600 GHz DDR3 RAM, 1 TB SSD, a Haswell architecture Intel CPU with 4 Cores and 8 Threads model i7-4870HQ @ 2.50GHz.
Intel Iris Pro GPU with Built-in Bus, VRAM 1.5 GB, Display 2880 x 1800 Retina, 24-Bit color.
macOS Monterey; browsers: Waterfox "Current", Vivaldi and (now and then) Chrome; security apps. Intego AV-
This reply was modified 5 years ago by
OscarCP.
1 user thanked author for this post.
anonymous
GuestAugust 8, 2020 at 12:46 pm #2287164Hi first post registered because of this thread how gnarly I think this exploit is and the knowledgeable folks talking here I like it.
Anywho was reading in an article the Stuxnet virus used the print spooler elivation and that was ten years ago and it hasn’t been changed.
It’s a problem even if your hard drive is encrypted if you’re on windows and dumb enough to get phished into playing yourself, it seems like with the right social engineering and the right “pigeon” it could be doing a ton of damage. I wonder why it never was changed?
Viewing 4 reply threads - This topic has 11 replies, 6 voices, and was last updated 4 years, 10 months ago by
-

Plus Membership
Donations from Plus members keep this site going. You can identify the people who support AskWoody by the Plus badge on their avatars.
AskWoody Plus members not only get access to all of the contents of this site -- including Susan Bradley's frequently updated Patch Watch listing -- they also receive weekly AskWoody Plus Newsletters (formerly Windows Secrets Newsletter) and AskWoody Plus Alerts, emails when there are important breaking developments.
Get Plus!
Welcome to our unique respite from the madness.
It's easy to post questions about Windows 11, Windows 10, Win8.1, Win7, Surface, Office, or browse through our Forums. Post anonymously or register for greater privileges. Keep it civil, please: Decorous Lounge rules strictly enforced. Questions? Contact Customer Support.
Search Newsletters
Search Forums
View the Forum
Search for Topics
Recent Topics
-
Windows 11 Insider Preview build 27871 released to Canary
by
joep517
14 hours, 22 minutes ago -
Windows 11 ad from Campaign Manager in Windows 10
by
Jim McKenna
11 hours, 42 minutes ago -
Small desktops
by
Susan Bradley
4 hours, 35 minutes ago -
Totally disable Bitlocker
by
CWBillow
12 hours, 43 minutes ago -
Phishers extract Millions from HMRC accounts..
by
Microfix
11 hours, 59 minutes ago -
Windows 10 22H2 Update today (5 June) says up-to-date but last was 2025-04
by
Alan_uk
1 day, 18 hours ago -
Thoughts on Malwarebytes Scam Guard for Mobile?
by
opti1
1 hour, 28 minutes ago -
Mystical Desktop
by
CWBillow
1 day, 21 hours ago -
Meta and Yandex secretly tracked billions of Android users
by
Alex5723
1 day, 2 hours ago -
MS-DEFCON 2: Do you need that update?
by
Susan Bradley
13 hours, 32 minutes ago -
CD/DVD drive is no longer recognized
by
WSCape Sand
2 days, 12 hours ago -
Windows 11 24H2 Default Apps stuck on Edge and Adobe Photoshop
by
MikeBravo
2 days, 15 hours ago -
North Face and Cartier customer data stolen in cyber attacks
by
Alex5723
2 days, 13 hours ago -
What is wrong with simple approach?
by
WSSpoke36
11 hours, 50 minutes ago -
Microsoft-Backed Builder.ai Set for Bankruptcy After Cash Seized
by
Alex5723
3 days, 1 hour ago -
Location, location, location
by
Susan Bradley
1 day, 15 hours ago -
Cannot get a task to run a restore point
by
CWBillow
3 days, 2 hours ago -
Frustrating search behavior with Outlook
by
MrJimPhelps
2 days, 17 hours ago -
June 2025 Office non-Security Updates
by
PKCano
3 days, 13 hours ago -
Secure Boot Update Fails after KB5058405 Installed
by
SteveIT
1 day, 15 hours ago -
Firefox Red Panda Fun Stuff
by
Lars220
3 days, 13 hours ago -
How start headers and page numbers on page 3?
by
Davidhs
3 days, 23 hours ago -
Attack on LexisNexis Risk Solutions exposes data on 300k +
by
Nibbled To Death By Ducks
3 days, 2 hours ago -
Windows 11 Insider Preview build 26200.5622 released to DEV
by
joep517
4 days, 8 hours ago -
Windows 11 Insider Preview build 26120.4230 (24H2) released to BETA
by
joep517
4 days, 8 hours ago -
MS Excel 2019 Now Prompts to Back Up With OneDrive
by
lmacri
3 days, 22 hours ago -
Firefox 139
by
Charlie
3 days, 14 hours ago -
Who knows what?
by
Will Fastie
2 days, 17 hours ago -
My top ten underappreciated features in Office
by
Peter Deegan
19 hours, 38 minutes ago -
WAU Manager — It’s your computer, you are in charge!
by
Deanna McElveen
5 hours, 32 minutes ago
Recent blog posts
Key Links
Want to Advertise in the free newsletter? How about a gift subscription in honor of a birthday? Send an email to sb@askwoody.com to ask how.
Mastodon profile for DefConPatch
Mastodon profile for AskWoody
Home • About • FAQ • Posts & Privacy • Forums • My Account
Register • Free Newsletter • Plus Membership • Gift Certificates • MS-DEFCON Alerts
Copyright ©2004-2025 by AskWoody Tech LLC. All Rights Reserved.