CVE-2023-21760 Overview
CVE-2023-21760 is an elevation of privilege vulnerability affecting the Windows Print Spooler service across a wide range of Microsoft Windows operating systems. This vulnerability allows a local attacker with low-level privileges to exploit improper link resolution before file access (symlink following) to elevate their privileges on affected systems. The Windows Print Spooler has historically been a target for attackers due to its complex architecture and system-level privileges.
Critical Impact
A local attacker could exploit this vulnerability to gain elevated privileges, potentially achieving high-level write access and causing denial of service conditions on affected Windows systems.
Affected Products
- Microsoft Windows 10 (multiple versions including 20H2, 21H2, 22H2, 1607, 1809)
- Microsoft Windows 11 (21H2, 22H2 - both x64 and ARM64)
- Microsoft Windows 7 SP1
- Microsoft Windows 8.1
- Microsoft Windows RT 8.1
- Microsoft Windows Server 2008 (SP2 and R2 SP1)
- Microsoft Windows Server 2012 (including R2)
- Microsoft Windows Server 2016
- Microsoft Windows Server 2019
- Microsoft Windows Server 2022
Discovery Timeline
- January 10, 2023 - CVE-2023-21760 published to NVD
- November 21, 2024 - Last updated in NVD database
Technical Details for CVE-2023-21760
Vulnerability Analysis
This elevation of privilege vulnerability exists within the Windows Print Spooler service due to improper handling of symbolic links (symlinks). The vulnerability is classified under CWE-59 (Improper Link Resolution Before File Access), indicating that the Print Spooler fails to properly validate file paths when following symbolic links. This weakness enables attackers to redirect file operations to unintended locations, potentially allowing modification of protected system files or data.
The attack requires local access and low privileges to execute, meaning an attacker must already have a foothold on the target system. However, no user interaction is required to exploit the vulnerability once the attacker has local access. Successful exploitation can result in significant integrity and availability impacts, allowing unauthorized modification of data and potential system disruption.
Root Cause
The root cause of CVE-2023-21760 is improper link resolution before file access within the Windows Print Spooler service. When the Print Spooler processes certain file operations, it fails to adequately validate whether the target path has been manipulated through symbolic links. This allows an attacker to create malicious symlinks that redirect Print Spooler file operations to sensitive system locations, effectively bypassing normal security controls.
Attack Vector
The attack vector for this vulnerability is local, requiring the attacker to have existing access to the target system with low-level privileges. The exploitation flow involves the attacker creating a symbolic link that points to a protected file or directory. When the Print Spooler service performs file operations, it follows the symlink without proper validation, allowing the attacker to manipulate or overwrite files they would not normally have access to.
The vulnerability enables an attacker to perform unauthorized file operations with the elevated privileges of the Print Spooler service, which typically runs as SYSTEM. This can lead to privilege escalation, data manipulation, or denial of service conditions affecting system availability.
Detection Methods for CVE-2023-21760
Indicators of Compromise
- Unexpected symbolic link creation in directories associated with the Print Spooler service (e.g., C:\Windows\System32\spool\)
- Anomalous file modifications or deletions in protected system directories that correlate with Print Spooler activity
- Unusual process behavior from spoolsv.exe including unexpected file access patterns
- Security event logs showing privilege escalation attempts from low-privilege accounts
Detection Strategies
- Monitor for symbolic link creation events in Print Spooler-related directories using Windows Security Event logging
- Implement endpoint detection rules to identify suspicious symlink operations followed by Print Spooler file access
- Deploy behavioral analysis to detect unusual spoolsv.exe process activity, particularly file operations outside normal Print Spooler paths
- Use SentinelOne's Behavioral AI to detect privilege escalation patterns associated with symlink attacks
Monitoring Recommendations
- Enable detailed auditing for the C:\Windows\System32\spool\ directory and its subdirectories
- Configure Windows Event Forwarding to centralize Print Spooler-related security events for analysis
- Implement continuous monitoring of the Print Spooler service status and configuration changes
- Review system integrity monitoring alerts for unauthorized modifications to system files
How to Mitigate CVE-2023-21760
Immediate Actions Required
- Apply the Microsoft security update for CVE-2023-21760 immediately on all affected Windows systems
- Prioritize patching of systems where users have local access, particularly shared workstations and terminal servers
- If patching is not immediately possible, consider temporarily disabling the Print Spooler service on systems where printing is not required
- Review and restrict user permissions to minimize the number of accounts with local access to sensitive systems
Patch Information
Microsoft has released security updates addressing CVE-2023-21760 as part of their January 2023 security update cycle. Organizations should obtain the appropriate patches from the Microsoft Security Update Guide for CVE-2023-21760. The patches are available through Windows Update, Windows Server Update Services (WSUS), and the Microsoft Update Catalog for all affected Windows versions.
Workarounds
- Disable the Print Spooler service on systems where printing functionality is not required using Stop-Service -Name Spooler -Force; Set-Service -Name Spooler -StartupType Disabled
- Restrict Print Spooler service permissions using Group Policy to limit which users can interact with the service
- Implement application control policies to prevent unauthorized creation of symbolic links in Print Spooler directories
- Apply the principle of least privilege to limit the number of users with local access to affected systems
# Disable Print Spooler service as a temporary mitigation
# Run in elevated PowerShell
Stop-Service -Name Spooler -Force
Set-Service -Name Spooler -StartupType Disabled
# To re-enable after patching:
# Set-Service -Name Spooler -StartupType Automatic
# Start-Service -Name Spooler
Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.


