Windows Print Spooler embedded in EcoStruxure™ Process Expert
CVE-2021-34527 and CVE-2021-1675 (PrintNightmare) affect the Windows Print Spooler service embedded in EcoStruxure™ Process Expert DCS. The Print Spooler is enabled by default on the system's Windows machines. An attacker with user credentials can exploit this to perform privileged file operations and achieve remote code execution. Because EcoStruxure™ Process Expert uses embedded virtualization, standard Microsoft patches cannot be applied directly; the vendor must release a fixed version of the product itself.
- Valid user account on the EcoStruxure™ Process Expert system or connected engineering workstation
- Network access to RPC Endpoint Mapper (port 135/TCP) and/or SMB ports (139/TCP or 445/TCP)
- Print Spooler service running and enabled on the target system
Patching may require device reboot — plan for process interruption
/api/v1/advisories/086be734-1cb7-4095-bf23-7c74dbf233e4Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.