“Pentera helps us prioritize what truly matters and gives us confidence we are covering our global environment continuously.”
“Seeing a domain admin account cracked in production changed how we view internal exposure.”
“Pentera helped us advance our red team and continuously improve penetration testing.”
“Pentera makes it easier to focus on what is truly exploitable instead of chasing long vulnerability lists.”
“In a complex, large-scale environment, Pentera delivers the speed and visibility security teams need.”
“Pentera amplified our team’s performance and delivered measurable value to upper management.”
"Pentera allows us to tailor testing to each service, reduce time and costs, and shift our focus from simply finding vulnerabilities to actively helping our teams fix them.”
Rubén Alonso | Head of Secure
Development Unit, Telefonica
“I don’t think we’d be able to advance our red team without Pentera. If you’re looking to improve penetration testing, I would definitely recommend it.”
PrintNightmare showed how a common Windows service can become a high-impact attack path when exploited for remote code execution and privilege escalation. The real challenge was never just patching—it was understanding where the vulnerability could actually lead inside the environment. Security teams need continuous validation to prioritize exposure based on real attack paths, not just urgency around the latest headline.
Pentera Team
09 Sep 2021
Greenpeace recently took credit for the PrintNightmare exploitation, warning that if the world does not shift to paperless immediately, further devastating actions will be taken.
Jokes (and conspiracy theories) aside, for the past couple of weeks, we’ve all heard more about printing vulnerabilities than we ever wanted.
The Print Spooler: A Security Weak Point
The Windows Print Spooler service runs by default on every Windows host, including domain controllers, allowing users to print. What seems like a harmless service has become a critical weak point, leaving enterprises exposed to severe security risks.
This is yet another example of IT tools being turned against us. Just as PowerShell has been leveraged for fileless attacks, the print spooler service is now a vehicle for privilege escalation and remote code execution (RCE).
Microsoft, in an effort to retain user-friendly print management, created an exploitable security loophole.
Patch Confusday: The Never-Ending Patch Cycle
By now, we are all used to Patch Tuesday. But the PrintNightmare vulnerability pushed security teams to the breaking point, forcing multiple emergency patches.
Between 2020 and 2021, several vulnerabilities were discovered in the print spooler/fax code, including:
FaxHell (CVE-2020-1337)
Evil Printer
PrintDemon
PrintNightmare (CVE-2021-34527 & CVE-2021-1675)
The PrintNightmare Timeline
Analyzing the chain of events of recent PrintNightmare vulnerability:
June 21, 2021 – Microsoft upgraded CVE-2021-1675 from low to critical due to remote code execution (RCE) risks.
June 29, 2021 – Details emerged by a security researcher of a remotely exploitable vulnerability, dubbed PrintNightmare affecting all versions of Windows to date (servers and workstations alike).
July 1, 2021 – Microsoft assigned a new CVE: CVE-2021-34527.
July 6, 2021 – Microsoft released an emergency patch, but it only addressed RCE, leaving privilege escalation still exploitable.
August 10, 2021 – Another Print Spooler RCE vulnerability (CVE-2021-36936) surfaced.
August 11, 2021 – Microsoft issued a workaround fix for the Print Spooler vulnerability (CVE-2021-26958)
Confused? So is everyone else. And attackers aren’t giving up—organizations will need to defend against PrintNightmare for years to come.
Inspecting a vulnerability in silo will not reduce the organization’s true risk as critical context is missing. Let’s take an example:
Difficulty level: How easy is it to access the host where a specific vulnerability exists?
Reach: Can that host reach a critical asset on your network?
Known and active: Is there published or proof of in-the-wild exploitation?
Effort: What is the level of effort and sophistication required from the adversary?
Expand: How common is this vulnerability across the enterprise and what are the lateral movement possibilities?
Progress: If exploited, what are the possible post-exploitation actions that can be taken?
Prerequisite: Is a preliminary vulnerability required to access the vulnerable host?
Target and impact: How deep could the attacker go, across all layers of defense, if all the above conditions were met.
Solution: If remediated, what is the level of certainty that the problem is indeed fixed?
A risk-based approach allows security teams to prioritize threats that pose real risks—not just the ones marked as “critical” by a scanner.
PrintRansomHeaven: A Ransomware Goldmine
As expected, ransomware groups have weaponized PrintNightmare. Why?
Exists on almost every Windows system, including domain controllers
Exploitable for both Remote Code Execution and privilege escalation
No user interaction or privileged access required
Ransomware operators thrive on low-effort, high-impact exploits, and PrintNightmare is exactly that.
While your organization debates whether to go paperless, attackers are scanning for unpatched systems.
Remember: Knowing whether you’re exposed is important and knowing the potential impact of an attack is critical.
From Vulnerability Management to Security Validation
To outmaneuver attackers, organizations must move beyond siloed asset management, checklist-based vulnerability scanning, and traditional red teaming or bi-yearly penetration testing. These approaches, while valuable, often fail to provide a real-time understanding of security gaps. Instead, security teams should adopt a continuous validation strategy that tests real-world attack paths, emulates adversary tactics, and prioritizes vulnerabilities based on their actual exploitability rather than theoretical risk scores.
Validate Your Security Against PrintNightmare Today
Security isn’t about checking off patches—it’s about knowing if your defenses can withstand an attack.
Start today. Get a demo of how Pentera validates, prioritizes, and remediates the PrintNightmare vulnerability—mapping every possible attack path.