{"id":21386,"date":"2022-03-21T18:09:12","date_gmt":"2022-03-21T18:09:12","guid":{"rendered":"https:\/\/www.esecurityplanet.com\/?p=21386"},"modified":"2023-05-12T15:48:36","modified_gmt":"2023-05-12T15:48:36","slug":"misconfigured-mfa-printnightmare","status":"publish","type":"post","link":"https:\/\/www.esecurityplanet.com\/threats\/misconfigured-mfa-printnightmare\/","title":{"rendered":"Defending Against Misconfigured MFA &#038; PrintNightmare Vulnerabilities"},"content":{"rendered":"<p>Using misconfigured <a href=\"https:\/\/www.esecurityplanet.com\/mobile\/multi-factor-authentication\/\">multi-factor authentication (MFA)<\/a> and an unpatched Windows vulnerability, Russian state-sponsored hackers were able to breach a non-governmental organization (NGO) and escalate privileges, the Cybersecurity and Infrastructure Security Agency (CISA) and the FBI <a href=\"https:\/\/www.cisa.gov\/uscert\/ncas\/alerts\/aa22-074a\" target=\"_blank\" rel=\"noopener\">revealed<\/a> last week.<\/p>\n<p>By using a misconfigured Cisco Duo MFA implementation to force enrollment of a new device, the hackers were then able to use the <a href=\"https:\/\/www.esecurityplanet.com\/endpoint\/microsoft-security-under-scrutiny-after-recent-incidents\/\">&#8220;PrintNightmare&#8221; Windows Print Spooler<\/a> vulnerability (<a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2021-34527\" target=\"_blank\" rel=\"noopener\">CVE-2021-34527<\/a> and <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2021-36958\" target=\"_blank\" rel=\"noopener\">CVE-2021-36958<\/a>) to obtain administrator privileges.<\/p>\n<h2><strong>Inactive Accounts and Default Configurations<\/strong><\/h2>\n<p>Hackers gained initial access by brute-forcing an existing account via &#8220;a simple, predictable password&#8221; to enroll a new device in the MFA procedures, the agencies said. The targeted organization was using the default MFA configuration, so it was possible to re-enable MFA for a dormant account with a new device owned by the attackers.<\/p>\n<p>MFA was automatically disabled because the account was inactive for a long period. Unfortunately, the account was still enabled in <a href=\"https:\/\/www.esecurityplanet.com\/products\/active-directory-security-tools\/\">Active Directory<\/a>, which allowed hackers access to the network.<\/p>\n<p>After that, they modified a domain controller file, c:\\windows\\system32\\drivers\\etc\\hosts, to redirect all MFA calls (e.g., logins) to localhost instead of the MFA server.<\/p>\n<p>They exploited a default policy in MFA protocols called &#8220;Fail open&#8221; that disables verification if the MFA server is unreachable. They then authenticated to the victim&#8217;s <a href=\"https:\/\/www.esecurityplanet.com\/products\/enterprise-vpn-solutions\/\">VPN<\/a> to initiate a <a href=\"https:\/\/www.esecurityplanet.com\/endpoint\/secure-access-for-remote-workers-rdp-vpn-vdi\/\">remote desktop protocol (RDP)<\/a> connection to the domain controllers. That\u2019s how they obtained credentials for other domain accounts and replicated the operation to bypass MFA.<\/p>\n<p>This unfortunate turn of events shows how adversaries can quickly sneak into a system and exploit vulnerabilities to escalate privileges and compromise the whole network. Even with such significant flaws, proper <a href=\"https:\/\/www.esecurityplanet.com\/networks\/microsegmentation-software\/\">network segmentation<\/a> and <a href=\"https:\/\/www.esecurityplanet.com\/products\/zero-trust-security-solutions\/\">zero trust<\/a> could have reduced the damage, perhaps blocking the attack at some point.<\/p>\n<p>In <a href=\"https:\/\/www.esecurityplanet.com\/products\/privileged-access-management-pam-software\/\">privileged<\/a> areas, there are no small problems.<\/p>\n<p>Also read: <a href=\"https:\/\/www.esecurityplanet.com\/products\/active-directory-security-tools\/\">Top 9 Active Directory Security Tools<\/a><\/p>\n<h2><strong>PrintNightmare Remains a Struggle<\/strong><\/h2>\n<p><a href=\"https:\/\/docs.microsoft.com\/en-us\/answers\/questions\/517533\/pint-server-and-print-nightmare-update.html\" target=\"_blank\" rel=\"noopener\">Admins<\/a> <a href=\"https:\/\/www.reddit.com\/r\/sysadmin\/comments\/slkdsn\/anyone_have_a_final_printnightmare_resolution\/\" target=\"_blank\" rel=\"noopener\">have struggled<\/a> with PrintNightmare fixes and patches, and hackers can still exploit a vulnerable Windows Print Spooler service to elevate their privileges.<\/p>\n<p>Print spooler is a service in Windows that manages all print jobs sent to the print server. You can actually observe the service in Windows by opening the services.msc utility. It works great but researchers found a bug in the driver installation procedure that allows bypassing authorization using a RPC (Remote Procedure Call) function to install a malicious DLL and ultimately execute arbitrary code.<\/p>\n<p>There are multiple POCs (proofs of concept) available publicly like <a href=\"https:\/\/github.com\/cube0x0\/CVE-2021-1675\" target=\"_blank\" rel=\"noopener\">this python script<\/a> that work on a &#8220;fully patched Domain Controller.&#8221; Microsoft partially mitigated the bug but not the privilege escalation. Applying the patches does not eliminate all risks but not doing so would be a significant risk.<\/p>\n<p>Of course, you could disable the Print Spooler service but that would disable print both locally and remotely, which does not look like a valid solution:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-large wp-image-21388\" src=\"https:\/\/www.esecurityplanet.com\/wp-content\/uploads\/2022\/03\/disable-print-1024x48.png\" alt=\"disable print\" width=\"696\" height=\"33\" srcset=\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/03\/disable-print-1024x48.png 1024w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/03\/disable-print-300x14.png 300w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/03\/disable-print-768x36.png 768w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/03\/disable-print-1536x71.png 1536w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/03\/disable-print-150x7.png 150w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/03\/disable-print-696x32.png 696w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/03\/disable-print-1068x50.png 1068w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/03\/disable-print.png 1678w\" sizes=\"(max-width: 696px) 100vw, 696px\" \/><\/p>\n<p>Print Spooler has a long history of bugs and misdiagnosis, but CVE-2021-34527 allows compromising the entire Windows system and affects an extensive range of Microsoft products.<\/p>\n<p>The bug itself does not require high privileges, as any authenticated user is enough to attack domain controllers:<\/p>\n<figure id=\"attachment_21387\" aria-describedby=\"caption-attachment-21387\" style=\"width: 696px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"size-large wp-image-21387\" src=\"https:\/\/www.esecurityplanet.com\/wp-content\/uploads\/2022\/03\/nightmare2-1024x538.jpeg\" alt=\"printnightmare\" width=\"696\" height=\"366\" srcset=\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/03\/nightmare2-1024x538.jpeg 1024w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/03\/nightmare2-300x158.jpeg 300w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/03\/nightmare2-768x403.jpeg 768w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/03\/nightmare2-150x79.jpeg 150w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/03\/nightmare2-696x366.jpeg 696w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/03\/nightmare2-1068x561.jpeg 1068w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/03\/nightmare2.jpeg 1182w\" sizes=\"(max-width: 696px) 100vw, 696px\" \/><figcaption id=\"caption-attachment-21387\" class=\"wp-caption-text\">Source: Twitter \u2013 Benjamin Delpy<\/figcaption><\/figure>\n<p>Mitigations that would consist of restricting permissions for driver installations could be challenging because you have to modify Windows registry entries, so if it\u2019s not executed correctly, you might damage the system.<\/p>\n<p>Also read: <a href=\"https:\/\/www.esecurityplanet.com\/products\/patch-management-software\/\">Best Patch Management Software<\/a><\/p>\n<h2><strong>Protecting Against PrintNightmare, MFA Exploits<\/strong><\/h2>\n<p>FBI and CISA recommend a long list of mitigations and security and network best practices, which can consist of hardening login policies and restricting admin privileges but also monitoring remote access or unapproved protocols. Here is the full list:<\/p>\n<h3><strong>Mitigations<\/strong><\/h3>\n<ul>\n<li>Enforce MFA for all users, without exception. Before implementing, organizations should review configuration policies to protect against &#8220;fail open&#8221; and re-enrollment scenarios.<\/li>\n<li>Implement time-out and lock-out features in response to repeated failed login attempts.<\/li>\n<li>Ensure inactive accounts are disabled uniformly across the Active Directory, MFA systems etc.<\/li>\n<li>Update software, including operating systems, applications, and firmware on IT network assets in a timely manner. Prioritize patching <a href=\"https:\/\/www.cisa.gov\/known-exploited-vulnerabilities-catalog\" target=\"_blank\" rel=\"noopener\">known exploited vulnerabilities<\/a>, especially critical and high vulnerabilities that allow for remote code execution or denial-of-service on internet-facing equipment.<\/li>\n<li>Require all accounts with password logins (e.g., service account, admin accounts, and domain admin accounts) to have strong, unique passwords. Passwords should not be reused across multiple accounts or stored on the system where an adversary may have access.<\/li>\n<li>Continuously monitor network logs for suspicious activity and unauthorized or unusual login attempts.<\/li>\n<li>Implement security alerting policies for all changes to security-enabled accounts\/groups, and alert on suspicious process creation events (ntdsutil, rar, regedit, etc.).<\/li>\n<\/ul>\n<h3><strong>Security Best Practices<\/strong><\/h3>\n<ul>\n<li>Deploy Local Administrator Password Solution (LAPS), enforce Server Message Block (SMB) Signing, restrict Administrative privileges (local admin users, groups, etc.), and review sensitive materials on domain controller\u2019s SYSVOL share.<\/li>\n<li>Enable increased logging policies, enforce PowerShell logging, and ensure <a href=\"https:\/\/www.esecurityplanet.com\/products\/antivirus-software\/\">antivirus<\/a>\/<a href=\"https:\/\/www.esecurityplanet.com\/products\/edr-solutions\/\">endpoint detection and response (EDR)<\/a> are deployed to all endpoints and enabled.<\/li>\n<li>Routinely verify no unauthorized system modifications, such as additional accounts and Secure Shell (SSH) keys, have occurred to help detect a compromise. To detect these modifications, administrators can use file integrity monitoring software that alerts an administrator or blocks unauthorized changes on the system.<\/li>\n<\/ul>\n<h3><strong>Network Best Practices<\/strong><\/h3>\n<ul>\n<li>Monitor remote access\/ RDP logs and disable unused remote access\/RDP ports.<\/li>\n<li>Deny atypical inbound activity from known anonymization services, to include commercial VPN services and The Onion Router (TOR).<\/li>\n<li>Implement listing policies for applications and remote access that only allow systems to execute known and permitted programs under an established security policy.<\/li>\n<li>Regularly audit administrative user accounts and configure access control under the concept of least privilege.<\/li>\n<li>Regularly audit logs to ensure new accounts are legitimate users.<\/li>\n<li>Scan networks for open and listening ports and mediate those that are unnecessary.<\/li>\n<li>Maintain historical network activity logs for at least 180 days, in case of a suspected compromise.<\/li>\n<li>Identify and create offline backups for critical assets.<\/li>\n<li>Implement network segmentation.<\/li>\n<li>Automatically update antivirus and anti-<a href=\"https:\/\/www.esecurityplanet.com\/threats\/malware-types\/\">malware<\/a> solutions and conduct regular virus and malware scans.<\/li>\n<\/ul>\n<h3><strong>Remote Work Environment Best Practices<\/strong><\/h3>\n<ul>\n<li>Regularly update VPNs, network infrastructure devices, and devices used for remote work environments with the latest software patches and security configurations.<\/li>\n<li>When possible, implement multi-factor authentication on all VPN connections. Physical <a href=\"https:\/\/www.esecurityplanet.com\/threats\/tokenization-vs-encryption\/\">security tokens<\/a> are the most secure form of MFA, followed by authenticator applications. When MFA is unavailable, require employees engaging in remote work to use strong passwords.<\/li>\n<li>Monitor network traffic for unapproved and unexpected protocols.<\/li>\n<li>Reduce potential attack surfaces by discontinuing unused VPN servers that may be used as a point of entry for attackers.<\/li>\n<\/ul>\n<h2><strong>Vigilance is Required<\/strong><\/h2>\n<p>Regular <a href=\"https:\/\/www.esecurityplanet.com\/networks\/vulnerability-assessment-process\/\">vulnerability assessments<\/a> and <a href=\"https:\/\/www.esecurityplanet.com\/products\/best-penetration-testing\/\">pentesting<\/a> are becoming less optional all the time. System administrators can schedule scans to spot unauthorized system modifications or unwanted additional SSH accesses.<\/p>\n<p>Evidence of compromise, also known as IoCs (Indicators of Compromise), are helpful for determining what happened after an attack. Typical IoCs can be unusual activities in privileged accounts, suspicious registry changes, traffic leaving the network (outbound), suspicious <a href=\"https:\/\/www.esecurityplanet.com\/networks\/how-to-prevent-dns-attacks\/\">DNS requests<\/a>, or geographical anomalies such as login attempts from countries where the organization does not have any business activities.<\/p>\n<p>Organizations can use specific software to check file integrity and detection tools such as EDR, but these efforts should cover the entire attack surface, including all potential endpoints.<\/p>\n<p>Aggressive <a href=\"https:\/\/www.esecurityplanet.com\/products\/patch-management-software\/\">patch management<\/a>, network segmentation, and hardened security policies can be powerful mitigations.<\/p>\n<p>The attack showed that inactive accounts and default policies are prone to lateral movements and used for privilege escalation. You should absolutely ensure such dormant accounts are disabled uniformly across your entire network, including Active Directory, MFA, and other procedures.<\/p>\n<p>Indeed, it\u2019s best if you remove access for all unused resources such as old accounts or VPN servers that hackers will likely use as a point of entry.<\/p>\n<p>Read next: <a href=\"https:\/\/www.esecurityplanet.com\/products\/vulnerability-management-software\/\">Top Vulnerability Management Tools<\/a><\/p>\n\n\n<div id=\"ta-campaign-widget-66d6f16733edf-popup-wrapper\" class=\"ta-campaign-widget__popup-wrapper\">\n    \n<div\n    style=\"\n        --ta-campaign-plugin-primary: #3545ed;\n        --ta-campaign-plugin-button-text: #fff;\n        --ta-campaign-plugin-button-hover-background: #3231b4;\n        --ta-campaign-plugin-button-hover-text: #fff;\n        --ta-campaign-plugin-button-toggle-background: #3231b4;\n        --ta-campaign-plugin-button-toggle-text: #3231B4;\n    \"\n    data-ajax-url=\"https:\/\/www.esecurityplanet.com\/wp\/wp-admin\/admin-ajax.php\">\n    <div\n        id=\"ta-campaign-widget-66d6f16733edf\"\n        class=\"ta-campaign-widget ta-campaign-widget--popup\"\n        data-campaign-fields='{\"properties\":{\"campaign_type\":\"popup\",\"campaign_category\":false,\"sailthru_list\":[\"cybersecurity-insider\"],\"popup_type\":\"exit_intent\",\"appearance\":{\"colors\":{\"primary_color\":\"#3545ed\",\"button\":{\"button_text_color\":\"#fff\",\"hover\":{\"button_hover_background_color\":\"#3231b4\",\"button_hover_text_color\":\"#fff\"},\"toggle\":{\"button_toggle_background_color\":\"#3231b4\",\"button_toggle_text_color\":\"#3231B4\"}}},\"custom_scss\":\"\"},\"behavior\":{\"opt_in_enabled\":true},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}},\"identifier\":\"66d6f16733edf\",\"campaign_id\":26045,\"campaign_type\":\"popup\",\"popup_type\":\"exit_intent\",\"newsletters\":[\"cybersecurity-insider\"],\"behavior\":{\"opt_in_enabled\":true},\"appearance\":{\"colors\":{\"primary\":\"#3545ed\",\"button\":{\"text\":\"#fff\",\"hover\":{\"background\":\"#3231b4\",\"text\":\"#fff\"},\"toggle\":{\"background\":\"#3231b4\",\"text\":\"#3231B4\"}}},\"custom_css\":\"\"},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}}'>\n\n                <div class=\"ta-campaign-widget__exit\">\n            <svg class=\"w-8\" fill=\"none\" stroke=\"currentColor\" stroke-width=\"1.5\" viewBox=\"0 0 24 24\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\">\n                <path stroke-linecap=\"round\" stroke-linejoin=\"round\" d=\"M6 18L18 6M6 6l12 12\"><\/path>\n            <\/svg>\n        <\/div>\n        \n        <div class=\"ta-campaign-widget__wrapper\">\n            <div class=\"ta-campaign-widget__header mb-6\">\n                                <h3 class=\"ta-campaign-widget__tagline\">\n                    Get the Free Cybersecurity Newsletter                <\/h3>\n                \n                \n                                <p class=\"ta-campaign-widget__content mt-6\">\n                    Strengthen your organization's IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday                <\/p>\n                            <\/div>\n\n            <form class=\"ta-campaign-widget__form\">\n                <div class=\"ta-campaign-widget__input mb-4\"  data-field=\"email\">\n                    <label\n                        class=\"sr-only\"\n                        for=\"email-66d6f16733edf\">\n                        Email Address\n                    <\/label>\n                    <input\n                        class=\"ta-campaign-widget__input__text\"\n                        placeholder=\"Work Email Address\"\n                        id=\"email-66d6f16733edf\"\n                        name=\"email\"\n                        type=\"email\">\n                <\/div>\n\n                                <div class=\"ta-campaign-widget__checkbox mb-4\" data-field=\"opt_in\">\n                    <div class=\"flex items-start\">\n                        <input\n                            id=\"opt-in-66d6f16733edf\"\n                            class=\"ta-campaign-widget__checkbox__input mr-2\"\n                            name=\"opt-in\"\n                            type=\"checkbox\"\/>\n                        <label\n                            class=\"ta-campaign-widget__checkbox__label\"\n                            for=\"opt-in-66d6f16733edf\">\n                            By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.                        <\/label>\n                    <\/div>\n                <\/div>\n                \n                <button class=\"ta-campaign-widget__button\" type=\"submit\" >\n                    Subscribe                <\/button>\n            <\/form>\n        <\/div>\n    <\/div>\n<\/div>\n\n<style>\n<\/style><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Using misconfigured multi-factor authentication (MFA) and an unpatched Windows vulnerability, Russian state-sponsored hackers were able to breach a non-governmental organization (NGO) and escalate privileges, the Cybersecurity and Infrastructure Security Agency (CISA) and the FBI revealed last week. By using a misconfigured Cisco Duo MFA implementation to force enrollment of a new device, the hackers were [&hellip;]<\/p>\n","protected":false},"author":267,"featured_media":21387,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_gazelle_contributing_experts":"","footnotes":""},"categories":[15],"tags":[7253],"b2b_audience":[33],"b2b_industry":[],"b2b_product":[31788,31787,31781,401],"class_list":["post-21386","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-threats","tag-multi-factor-authentication","b2b_audience-awareness-and-consideration","b2b_product-advanced-persistent-threats","b2b_product-data-breach","b2b_product-multi-factor-access-management","b2b_product-operating-system-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Defending Against Misconfigured MFA &amp; PrintNightmare Vulnerabilities | eSecurity Planet<\/title>\n<meta name=\"description\" content=\"Errors and flaws in multi-factor authentication and the PrintNightmare vulnerability is a bad combination worth fixing.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.esecurityplanet.com\/threats\/misconfigured-mfa-printnightmare\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Defending Against Misconfigured MFA &amp; PrintNightmare Vulnerabilities | eSecurity Planet\" \/>\n<meta property=\"og:description\" content=\"Errors and flaws in multi-factor authentication and the PrintNightmare vulnerability is a bad combination worth fixing.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.esecurityplanet.com\/threats\/misconfigured-mfa-printnightmare\/\" \/>\n<meta property=\"og:site_name\" content=\"eSecurity Planet\" \/>\n<meta property=\"article:published_time\" content=\"2022-03-21T18:09:12+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-05-12T15:48:36+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/03\/nightmare2.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"1182\" \/>\n\t<meta property=\"og:image:height\" content=\"621\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Julien Maury\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:site\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Julien Maury\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/misconfigured-mfa-printnightmare\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/misconfigured-mfa-printnightmare\/\"},\"author\":{\"name\":\"Julien Maury\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/4723f5dca54d7ee1d8111912ac8b1d4a\"},\"headline\":\"Defending Against Misconfigured MFA &#038; PrintNightmare Vulnerabilities\",\"datePublished\":\"2022-03-21T18:09:12+00:00\",\"dateModified\":\"2023-05-12T15:48:36+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/misconfigured-mfa-printnightmare\/\"},\"wordCount\":1308,\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/misconfigured-mfa-printnightmare\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/03\/nightmare2.jpeg\",\"keywords\":[\"multi-factor authentication\"],\"articleSection\":[\"Threats\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/misconfigured-mfa-printnightmare\/\",\"url\":\"https:\/\/www.esecurityplanet.com\/threats\/misconfigured-mfa-printnightmare\/\",\"name\":\"Defending Against Misconfigured MFA & PrintNightmare Vulnerabilities | eSecurity Planet\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/misconfigured-mfa-printnightmare\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/misconfigured-mfa-printnightmare\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/03\/nightmare2.jpeg\",\"datePublished\":\"2022-03-21T18:09:12+00:00\",\"dateModified\":\"2023-05-12T15:48:36+00:00\",\"description\":\"Errors and flaws in multi-factor authentication and the PrintNightmare vulnerability is a bad combination worth fixing.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/misconfigured-mfa-printnightmare\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.esecurityplanet.com\/threats\/misconfigured-mfa-printnightmare\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/misconfigured-mfa-printnightmare\/#primaryimage\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/03\/nightmare2.jpeg\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/03\/nightmare2.jpeg\",\"width\":1182,\"height\":621,\"caption\":\"Source: Twitter \u2013 Benjamin Delpy\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/misconfigured-mfa-printnightmare\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.esecurityplanet.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Defending Against Misconfigured MFA &#038; PrintNightmare Vulnerabilities\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"name\":\"eSecurity Planet\",\"description\":\"Industry-leading guidance and analysis for how to keep your business secure.\",\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.esecurityplanet.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\",\"name\":\"eSecurityPlanet\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"width\":1134,\"height\":375,\"caption\":\"eSecurityPlanet\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/eSecurityPlanet\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/4723f5dca54d7ee1d8111912ac8b1d4a\",\"name\":\"Julien Maury\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/02\/JulienMaury-AvatarImg-150x150.webp\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/02\/JulienMaury-AvatarImg-150x150.webp\",\"caption\":\"Julien Maury\"},\"description\":\"eSecurity Planet contributor Julien Maury writes about penetration testing, code security, open source security and more. He is a backend developer, a mentor and a technical writer who enjoys sharing his knowledge and learning new concepts.\",\"url\":\"https:\/\/www.esecurityplanet.com\/author\/jmaury\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Defending Against Misconfigured MFA & PrintNightmare Vulnerabilities | eSecurity Planet","description":"Errors and flaws in multi-factor authentication and the PrintNightmare vulnerability is a bad combination worth fixing.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.esecurityplanet.com\/threats\/misconfigured-mfa-printnightmare\/","og_locale":"en_US","og_type":"article","og_title":"Defending Against Misconfigured MFA & PrintNightmare Vulnerabilities | eSecurity Planet","og_description":"Errors and flaws in multi-factor authentication and the PrintNightmare vulnerability is a bad combination worth fixing.","og_url":"https:\/\/www.esecurityplanet.com\/threats\/misconfigured-mfa-printnightmare\/","og_site_name":"eSecurity Planet","article_published_time":"2022-03-21T18:09:12+00:00","article_modified_time":"2023-05-12T15:48:36+00:00","og_image":[{"width":1182,"height":621,"url":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/03\/nightmare2.jpeg","type":"image\/jpeg"}],"author":"Julien Maury","twitter_card":"summary_large_image","twitter_creator":"@eSecurityPlanet","twitter_site":"@eSecurityPlanet","twitter_misc":{"Written by":"Julien Maury","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.esecurityplanet.com\/threats\/misconfigured-mfa-printnightmare\/#article","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/misconfigured-mfa-printnightmare\/"},"author":{"name":"Julien Maury","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/4723f5dca54d7ee1d8111912ac8b1d4a"},"headline":"Defending Against Misconfigured MFA &#038; PrintNightmare Vulnerabilities","datePublished":"2022-03-21T18:09:12+00:00","dateModified":"2023-05-12T15:48:36+00:00","mainEntityOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/misconfigured-mfa-printnightmare\/"},"wordCount":1308,"publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/misconfigured-mfa-printnightmare\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/03\/nightmare2.jpeg","keywords":["multi-factor authentication"],"articleSection":["Threats"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.esecurityplanet.com\/threats\/misconfigured-mfa-printnightmare\/","url":"https:\/\/www.esecurityplanet.com\/threats\/misconfigured-mfa-printnightmare\/","name":"Defending Against Misconfigured MFA & PrintNightmare Vulnerabilities | eSecurity Planet","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/misconfigured-mfa-printnightmare\/#primaryimage"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/misconfigured-mfa-printnightmare\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/03\/nightmare2.jpeg","datePublished":"2022-03-21T18:09:12+00:00","dateModified":"2023-05-12T15:48:36+00:00","description":"Errors and flaws in multi-factor authentication and the PrintNightmare vulnerability is a bad combination worth fixing.","breadcrumb":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/misconfigured-mfa-printnightmare\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.esecurityplanet.com\/threats\/misconfigured-mfa-printnightmare\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/threats\/misconfigured-mfa-printnightmare\/#primaryimage","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/03\/nightmare2.jpeg","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/03\/nightmare2.jpeg","width":1182,"height":621,"caption":"Source: Twitter \u2013 Benjamin Delpy"},{"@type":"BreadcrumbList","@id":"https:\/\/www.esecurityplanet.com\/threats\/misconfigured-mfa-printnightmare\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.esecurityplanet.com\/"},{"@type":"ListItem","position":2,"name":"Defending Against Misconfigured MFA &#038; PrintNightmare Vulnerabilities"}]},{"@type":"WebSite","@id":"https:\/\/www.esecurityplanet.com\/#website","url":"https:\/\/www.esecurityplanet.com\/","name":"eSecurity Planet","description":"Industry-leading guidance and analysis for how to keep your business secure.","publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.esecurityplanet.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.esecurityplanet.com\/#organization","name":"eSecurityPlanet","url":"https:\/\/www.esecurityplanet.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","width":1134,"height":375,"caption":"eSecurityPlanet"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/eSecurityPlanet"]},{"@type":"Person","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/4723f5dca54d7ee1d8111912ac8b1d4a","name":"Julien Maury","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/02\/JulienMaury-AvatarImg-150x150.webp","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/02\/JulienMaury-AvatarImg-150x150.webp","caption":"Julien Maury"},"description":"eSecurity Planet contributor Julien Maury writes about penetration testing, code security, open source security and more. He is a backend developer, a mentor and a technical writer who enjoys sharing his knowledge and learning new concepts.","url":"https:\/\/www.esecurityplanet.com\/author\/jmaury\/"}]}},"_links":{"self":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/21386"}],"collection":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/users\/267"}],"replies":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/comments?post=21386"}],"version-history":[{"count":0,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/21386\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media\/21387"}],"wp:attachment":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media?parent=21386"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/categories?post=21386"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/tags?post=21386"},{"taxonomy":"b2b_audience","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_audience?post=21386"},{"taxonomy":"b2b_industry","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_industry?post=21386"},{"taxonomy":"b2b_product","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_product?post=21386"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}