S
Critical RiskWindows
spoolsv.exeEXECUTABLE

spoolsv.exe - Windows Print Spooler Service Analysis [2026]

spoolsv.exe is the Windows Print Spooler service. Historically vulnerable to critical exploits like PrintNightmare (CVE-2021-34527) enabling remote code execution and privilege escalation.

1viewsLast verified: Jan 18, 2025

Risk Summary

## Risk Summary | Factor | Assessment | |--------|------------| | Detection Difficulty | Medium | | Abuse Potential | Critical | | Prevalence | Universal | | Risk Score | 90/100 | spoolsv.exe has been the target of multiple critical vulnerabilities including PrintNightmare allowing RCE and privilege escalation.

Overview

What is spoolsv.exe?

spoolsv.exe (Print Spooler Service) is a Windows system service that manages print jobs and printer-related operations.

Key Characteristics

AttributeValue
File Namespoolsv.exe
DeveloperMicrosoft Corporation
Digital SignatureMicrosoft Windows
Service NameSpooler
TypeWindows Service

Technical Details

PropertyDescription
Process TypeWindows Service
Parent Processservices.exe
PrivilegesNT AUTHORITY\SYSTEM
NetworkRPC, SMB for network printing

The Print Spooler service manages local and network print queues and has been a frequent target of exploits.

Normal Behavior

Normal Behavior

Legitimate Characteristics

Service: Spooler
Process: spoolsv.exe
Parent: services.exe
Location: C:\Windows\System32\spoolsv.exe
User: NT AUTHORITY\SYSTEM

Expected Characteristics

AspectExpected Behavior
Parent Processservices.exe
LocationC:\Windows\System32\
User ContextSYSTEM
InstancesSingle
NetworkPrinter ports, RPC

Related Components

ComponentPurpose
Print driversPrinter communication
printfilterpipelinesvc.exeFilter pipeline
PrintIsolationHost.exeDriver isolation

Common Locations

C:\Windows\System32\spoolsv.exe

Suspicious Indicators

Suspicious Indicators

Red Flags

IndicatorConcern LevelDescription
Child cmd/powershellCriticalExploitation indicator
Unusual DLLsCriticalMalicious driver/DLL
Wrong locationCriticalNot in System32
Network anomaliesHighUnexpected connections
CrashesMediumPotential exploitation

PrintNightmare Indicators

Exploitation Signs:
- spoolsv.exe spawning cmd.exe or powershell.exe
- DLLs loaded from unusual locations
- New printer drivers installed
- Remote connections preceding child processes
- Unusual crash patterns

Attack Indicators

PatternConcern
Child shellsActive exploitation
Driver installationMalicious driver
RPC abuseRemote exploitation
File writesPayload drops

Abuse Techniques

Abuse Techniques

PrintNightmare (CVE-2021-34527)

PrintNightmare Attack:
1. Attacker exploits RPC vulnerability
2. Malicious DLL staged on share
3. AddPrinterDriverEx loads DLL
4. Code executes as SYSTEM
5. Full system compromise

Local Privilege Escalation

# LPE via Print Spooler
# Attacker with local access
# Exploits spooler to gain SYSTEM

Remote Code Execution

VectorMethod
CVE-2021-34527Remote driver loading
CVE-2021-1675Local privilege escalation
CVE-2021-36958Point and Print abuse

Persistence via Drivers

Driver Persistence:
1. Install malicious print driver
2. Driver loads with spoolsv
3. Survives reboots
4. Runs as SYSTEM

Remediation Steps

Remediation Steps

Immediate Actions

# Disable Print Spooler if not needed
Stop-Service -Name Spooler -Force
Set-Service -Name Spooler -StartupType Disabled

# Apply patches
# Ensure Windows Updates are current

# Check for exploitation
Get-WinEvent -FilterHashtable @{LogName="System";Id=808} |
    Where-Object { $_.Message -match "driver" }

Patching Priority

CVEPriorityImpact
CVE-2021-34527CriticalRCE/LPE
CVE-2021-1675CriticalLPE
CVE-2021-36958HighRCE via Point & Print

Hardening

ControlImplementation
Disable if not neededStop Spooler service
Restrict driversPoint and Print restrictions
Network segmentationLimit RPC access
MonitorAlert on child processes

Investigation Checklist

Investigation Checklist

Exploitation Check

  • Did spoolsv spawn shell processes?
  • Were new printer drivers installed?
  • Any unusual DLLs loaded?
  • Evidence of CVE exploitation?

Driver Analysis

  • What print drivers are installed?
  • Are drivers properly signed?
  • Any recent driver installations?
  • Drivers from unusual locations?

Network Analysis

  • Remote RPC connections?
  • SMB access to driver shares?
  • Lateral movement indicators?

Timeline

  • When did suspicious activity start?
  • What patches are installed?
  • Evidence of persistence?

MITRE ATT&CK Techniques