Description

Microsoft has identified a critical vulnerability in the Windows Line Printer Daemon (LPD) service, designated as CVE-2025-21224, which allows remote code execution on affected systems. This flaw is caused by improper handling of print job processing by the LPD service. By sending specially crafted print requests, unauthenticated attackers could exploit the vulnerability to gain control over a target system, potentially compromising its integrity and enabling further attacks within a network. The issue impacts multiple Windows versions, including Windows 11 (22H2 and 24H2), Windows 10 (21H2 and 22H2), and Windows Server (2022 and 2025) editions. Microsoft has addressed the vulnerability in the January 2025 Patch Tuesday updates, which include fixes such as KB5050009 and KB5049981. Although exploitation requires technical expertise, the potential consequences of a successful attack make this a high-priority issue, leading Microsoft to rate the vulnerability as "Important." Organizations are strongly advised to apply the relevant updates promptly to safeguard their systems. For additional protection, Microsoft recommends disabling the LPD service if it is not in use, restricting network access to systems running the service, and monitoring traffic targeting port 515, which is associated with LPD. While there have been no reports of active exploitation, the risks associated with this vulnerability emphasize the need for proactive security measures. This incident underscores the importance of securing legacy services like LPD, which are still utilized but may be susceptible to exploitation. Businesses should prioritize the deployment of updates and reassess network configurations to reduce exposure to similar vulnerabilities in the future.