Zurück zur Übersicht

Pepperl+Fuchs: Security Advisory for PrintNightmare Vulnerability in multiple HMI Devices

VDE-2021-034
Last update
30.07.2021 09:55
Published at
30.07.2021 09:55
Vendor(s)
Pepperl+Fuchs SE
External ID
VDE-2021-034
CSAF Document

Summary

A remote code execution vulnerability exists when the Windows Print Spooler service improperly performs privileged file operations. An attacker who successfully exploited this vulnerability could run arbitrary code with SYSTEM privileges. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.
See details on Microsoft Advisory CVE-2021-34527 (https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-34527)

Impact

An attacker could install programs; view, change, or delete data; or create new accounts with full user rights.

Affected Product(s)

Model no. Product name Affected versions
Box Thin Client BTC* vers:all/* Box Thin Client BTC* vers:all/*
VisuNet PC* vers:all/* VisuNet PC* vers:all/*
VisuNet RM* vers:all/* VisuNet RM* vers:all/*

Vulnerabilities

Expand / Collapse all

Published
22.09.2025 14:57
Weakness
Improper Privilege Management (CWE-269)
Summary

Windows Print Spooler Remote Code Execution Vulnerability

References

Remediation

Customers using Pepperl+Fuchs HMI devices out of VisuNet RM, VisuNet PC or Box Thin Client BTC* product families should follow these guidelines:

Pepperl+Fuchs HMI devices running RM Shell 5 should install "Security Patch PrintNightmare (18-34369)" to disable the "Allow Print Spooler to accept client connections:" group policy to block remote attacks: www.pepperl-fuchs.com/cgi-bin/db/doci...

Pepperl+Fuchs HMI devices running a Windows 10 LTSB 2016 or Windows 10 LTSC 2019 should use the Windows Update functionality to update the system.

Customers using HMI devices based on Windows 7 or older should upgrade to a Windows 10 LTSB 2016 or Windows 10 LTSC 2019 Version.

Security updates
Please check the P+F website regularly for Windows security updates and use our security update service to be informed about the latest security incidents. We will inform you as soon as Microsoft releases further security updates and measures for existing vulnerabilities.

For Support please contact your local Pepperl+Fuchs sales representative.

Revision History

Version Date Summary
1.0.0 30.07.2021 09:55 Initial revision.