ID

VAR-202107-1010


CVE

CVE-2021-34527


TITLE

Microsoft Windows Print Spooler allows for RCE via AddPrinterDriverEx()

Trust: 0.8

sources: CERT/CC: VU#383432

DESCRIPTION

<p>A remote code execution vulnerability exists when the Windows Print Spooler service improperly performs privileged file operations. An attacker who successfully exploited this vulnerability could run arbitrary code with SYSTEM privileges. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.</p> <p>UPDATE July 7, 2021: The security update for Windows Server 2012, Windows Server 2016 and Windows 10, Version 1607 have been released. Please see the Security Updates table for the applicable update for your system. We recommend that you install these updates immediately. If you are unable to install these updates, see the FAQ and Workaround sections in this CVE for information on how to help protect your system from this vulnerability.</p> <p>In addition to installing the updates, in order to secure your system, you must confirm that the following registry settings are set to 0 (zero) or are not defined (<strong>Note</strong>: These registry keys do not exist by default, and therefore are already at the secure setting.), also that your Group Policy setting are correct (see FAQ):</p> <ul> <li>HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows NT\Printers\PointAndPrint</li> <li>NoWarningNoElevationOnInstall = 0 (DWORD) or not defined (default setting)</li> <li>UpdatePromptSettings = 0 (DWORD) or not defined (default setting)</li> </ul> <p><strong>Having NoWarningNoElevationOnInstall set to 1 makes your system vulnerable by design.</strong></p> <p>UPDATE July 6, 2021: Microsoft has completed the investigation and has released security updates to address this vulnerability. Please see the Security Updates table for the applicable update for your system. We recommend that you install these updates immediately. If you are unable to install these updates, see the FAQ and Workaround sections in this CVE for information on how to help protect your system from this vulnerability. See also <a href="https://support.microsoft.com/topic/31b91c02-05bc-4ada-a7ea-183b129578a7">KB5005010: Restricting installation of new printer drivers after applying the July 6, 2021 updates</a>.</p> <p>Note that the security updates released on and after July 6, 2021 contain protections for CVE-2021-1675 and the additional remote code execution exploit in the Windows Print Spooler service known as “PrintNightmare”, documented in CVE-2021-34527.</p> . Print Spooler The service is a service for realizing the waiting for printing in printing. RpcAddPrinterDriverEx() The function is used by the above services to install the printer driver. Parameters DRIVER_CONTAINER Objects and parameters dwFileCopyFlags Controls the printer driver to be installed and how to copy files. If you are an authenticated user RpcAddPrinterDriverEx() The function can be executed. Therefore, an attacker who has obtained the authentication information can specify and install the driver on the remote server.By an authenticated remote third party SYSTEM Arbitrary code can be executed with privileges. Windows Print Spooler is a printer spooler for Windows. Microsoft Windows Print Spooler Components 存在安全漏洞,攻击者可以通过该漏洞绕过PfcAddPrinterDriver的安全验证,并在打印服务器中安装恶意的驱动程序。以下产品和版本受到影响:Windows 10 Version 1809 for 32-bit Systems,Windows 10 Version 1809 for x64-based Systems,Windows 10 Version 1809 for ARM64-based Systems,Windows Server 2019,Windows Server 2019 (Server Core installation),Windows 10 Version 1909 for 32-bit Systems,Windows 10 Version 1909 for x64-based Systems,Windows 10 Version 1909 for ARM64-based Systems,Windows Server, version 1909 (Server Core installation),Windows 10 Version 21H1 for x64-based Systems,Windows 10 Version 21H1 for ARM64-based Systems,Windows 10 Version 21H1 for 32-bit Systems,Windows 10 Version 2004 for 32-bit Systems,Windows 10 Version 2004 for ARM64-based Systems,Windows 10 Version 2004 for x64-based Systems,Windows Server, version 2004 (Server Core installation),Windows 10 Version 20H2 for x64-based Systems,Windows 10 Version 20H2 for 32-bit Systems,Windows 10 Version 20H2 for ARM64-based Systems,Windows Server, version 20H2 (Server Core Installation),Windows 10 for 32-bit Systems,Windows 10 for x64-based Systems,Windows 10 Version 1607 for 32-bit Systems,Windows 10 Version 1607 for x64-based Systems,Windows Server 2016,Windows Server 2016 (Server Core installation),Windows 7 for 32-bit Systems Service Pack 1,Windows 7 for x64-based Systems Service Pack 1,Windows 8.1 for 32-bit systems,Windows 8.1 for x64-based systems,Windows RT 8.1,Windows Server 2008 for 32-bit Systems Service Pack 2,Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation),Windows Server 2008 for x64-based Systems Service Pack 2,Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation),Windows Server 2008 R2 for x64-based Systems Service Pack 1,Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation),Windows Server 2012,Windows Server 2012 (Server Core installation),Windows Server 2012 R2,Windows Server 2012 R2 (Server Core installation). Pillow is a Python-based image processing library. There is currently no information about this vulnerability, please feel free to follow CNNVD or manufacturer announcements

Trust: 4.05

sources: NVD: CVE-2021-34527 // CERT/CC: VU#383432 // JVNDB: JVNDB-2021-001967 // CNVD: CNVD-2021-48426 // CNNVD: CNNVD-202107-137 // CNNVD: CNNVD-202104-975 // VULMON: CVE-2021-34527

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2021-48426

AFFECTED PRODUCTS

vendor:microsoftmodel:windows serverscope:eqversion:2016

Trust: 2.4

vendor:microsoftmodel:windows server r2 for x64-based systems service packscope:eqversion:20081

Trust: 1.2

vendor:microsoftmodel:windows server r2scope:eqversion:2012

Trust: 1.2

vendor:microsoftmodel:windows serverscope:eqversion:2019

Trust: 1.2

vendor:microsoftmodel:windows server for 32-bit systems servicepackscope:eqversion:20082

Trust: 1.2

vendor:microsoftmodel:windows 10 1507scope:ltversion:10.0.10240.18969

Trust: 1.0

vendor:microsoftmodel:windows 10 1607scope:ltversion:10.0.14393.4470

Trust: 1.0

vendor:microsoftmodel:windows 8.1scope:eqversion: -

Trust: 1.0

vendor:microsoftmodel:windows server 2019scope:ltversion:10.0.17763.2029

Trust: 1.0

vendor:microsoftmodel:windows server 2022scope:ltversion:10.0.20348.230

Trust: 1.0

vendor:microsoftmodel:windows rt 8.1scope:eqversion: -

Trust: 1.0

vendor:microsoftmodel:windows 10 1809scope:ltversion:10.0.17763.2029

Trust: 1.0

vendor:microsoftmodel:windows 10 21h2scope:ltversion:10.0.19044.1415

Trust: 1.0

vendor:microsoftmodel:windows 10 20h2scope:ltversion:10.0.19042.1083

Trust: 1.0

vendor:microsoftmodel:windows 11 22h2scope:ltversion:10.0.22621.674

Trust: 1.0

vendor:microsoftmodel:windows 10 22h2scope:ltversion:10.0.19045.2251

Trust: 1.0

vendor:microsoftmodel:windows 11 21h2scope:ltversion:10.0.22000.318

Trust: 1.0

vendor:microsoftmodel:windows server 2016scope:ltversion:10.0.14393.4470

Trust: 1.0

vendor:microsoftmodel:windows server 20h2scope:ltversion:10.0.19042.1083

Trust: 1.0

vendor:microsoftmodel:windows server 2012scope:eqversion: -

Trust: 1.0

vendor:microsoftmodel:windows server 2012scope:eqversion:r2

Trust: 1.0

vendor:microsoftmodel:windows server 2008scope:eqversion: -

Trust: 1.0

vendor:microsoftmodel:windows 7scope:eqversion: -

Trust: 1.0

vendor:microsoftmodel:windows server 2008scope:eqversion:r2

Trust: 1.0

vendor:マイクロソフトmodel:microsoft windows rt 8.1scope: - version: -

Trust: 0.8

vendor:マイクロソフトmodel:microsoft windows server 2016scope: - version: -

Trust: 0.8

vendor:マイクロソフトmodel:microsoft windows server 2012scope: - version: -

Trust: 0.8

vendor:マイクロソフトmodel:microsoft windows serverscope: - version: -

Trust: 0.8

vendor:マイクロソフトmodel:microsoft windows 8.1scope: - version: -

Trust: 0.8

vendor:マイクロソフトmodel:microsoft windows 7scope: - version: -

Trust: 0.8

vendor:マイクロソフトmodel:microsoft windows 10scope: - version: -

Trust: 0.8

vendor:マイクロソフトmodel:microsoft windows server 2008scope: - version: -

Trust: 0.8

vendor:マイクロソフトmodel:microsoft windows server 2019scope: - version: -

Trust: 0.8

vendor:microsoftmodel:windowsscope:eqversion:7

Trust: 0.6

vendor:microsoftmodel:windows windows serverscope:eqversion:2012

Trust: 0.6

vendor:microsoftmodel:windowsscope:eqversion:8.1

Trust: 0.6

vendor:microsoftmodel:windows rt sp0scope:eqversion:8.1

Trust: 0.6

vendor:microsoftmodel:windowsscope:eqversion:101607

Trust: 0.6

vendor:microsoftmodel:windows for 32-bit systemsscope:eqversion:10

Trust: 0.6

vendor:microsoftmodel:windows serverscope:eqversion:2012

Trust: 0.6

vendor:microsoftmodel:windows version for x64-based systemsscope:eqversion:101809

Trust: 0.6

vendor:microsoftmodel:windows version for arm64-based systemsscope:eqversion:101809

Trust: 0.6

vendor:microsoftmodel:windows version for 32-bit systemsscope:eqversion:101809

Trust: 0.6

vendor:microsoftmodel:windowsscope:eqversion:101909

Trust: 0.6

vendor:microsoftmodel:windows windowsscope:eqversion:101607

Trust: 0.6

vendor:microsoftmodel:windows server for x64-based systems servicepackscope:eqversion:20082

Trust: 0.6

vendor:microsoftmodel:windows windows for x64-based systemsscope:eqversion:10

Trust: 0.6

vendor:microsoftmodel:windows server 20h2scope: - version: -

Trust: 0.6

vendor:microsoftmodel:windows serverscope:eqversion:1909

Trust: 0.6

vendor:microsoftmodel:windows 20h2 for arm64-based systemsscope:eqversion:10

Trust: 0.6

vendor:microsoftmodel:windows 20h2 for 32-bit systemsscope:eqversion:10

Trust: 0.6

vendor:microsoftmodel:windows 20h2 for x64-based systemsscope:eqversion:10

Trust: 0.6

vendor:microsoftmodel:windows for x64-based systemsscope:eqversion:102004

Trust: 0.6

vendor:microsoftmodel:windows for arm64-based systemsscope:eqversion:102004

Trust: 0.6

vendor:microsoftmodel:windows for 32-bit systemsscope:eqversion:102004

Trust: 0.6

vendor:microsoftmodel:windows 21h1 for 32-bit systemsscope:eqversion:10

Trust: 0.6

vendor:microsoftmodel:windows 21h1 for arm64-bscope:eqversion:10

Trust: 0.6

sources: CNVD: CNVD-2021-48426 // JVNDB: JVNDB-2021-001967 // NVD: CVE-2021-34527

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2021-34527
value: HIGH

Trust: 1.0

secure@microsoft.com: CVE-2021-34527
value: HIGH

Trust: 1.0

IPA: JVNDB-2021-001967
value: HIGH

Trust: 0.8

CNVD: CNVD-2021-48426
value: HIGH

Trust: 0.6

CNNVD: CNNVD-202107-137
value: HIGH

Trust: 0.6

CNNVD: CNNVD-202104-975
value: MEDIUM

Trust: 0.6

VULMON: CVE-2021-34527
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2021-34527
severity: HIGH
baseScore: 9.0
vectorString: AV:N/AC:L/AU:S/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.1

CNVD: CNVD-2021-48426
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

nvd@nist.gov: CVE-2021-34527
baseSeverity: HIGH
baseScore: 8.8
vectorString: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 2.8
impactScore: 5.9
version: 3.1

Trust: 2.0

IPA: JVNDB-2021-001967
baseSeverity: HIGH
baseScore: 8.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: CNVD: CNVD-2021-48426 // VULMON: CVE-2021-34527 // JVNDB: JVNDB-2021-001967 // CNNVD: CNNVD-202107-137 // CNNVD: CNNVD-202104-975 // NVD: CVE-2021-34527 // NVD: CVE-2021-34527

PROBLEMTYPE DATA

problemtype:CWE-269

Trust: 1.0

sources: NVD: CVE-2021-34527

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-202107-137

TYPE

other

Trust: 1.2

sources: CNNVD: CNNVD-202107-137 // CNNVD: CNNVD-202104-975

PATCH

title:CVE-2021-34527 | Windows Print Spooler Remote Code Execution Vulnerabilityurl:https://docs.microsoft.com/en-us/openspecs/windows_protocols/ms-rprn/b96cc497-59e5-4510-ab04-5484993b259b

Trust: 0.8

title:Patch for Microsoft Windows Print Spooler code execution vulnerabilityurl:https://www.cnvd.org.cn/patchInfo/show/277186

Trust: 0.6

title:Multiple Microsoft Product code injection vulnerability fixesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=155832

Trust: 0.6

title:Check Point Security Alerts: Microsoft Windows Print Spooler Remote Code Execution (CVE-2021-34527)url:https://vulmon.com/vendoradvisory?qidtp=check_point_security_alerts&qid=93893ce22c8de5424f0b5d48db7fc253

Trust: 0.1

title:CVE-2021-34527 - PrintNightmare LPE (PowerShell)url:https://github.com/JohnHammond/CVE-2021-34527

Trust: 0.1

title:CVE-2021-34527 - PrintNightmare LPE (PowerShell)url:https://github.com/cyb3rpeace/CVE-2021-34527

Trust: 0.1

title:https://github.com/hackerhouse-opensource/hackerhouse-opensourceurl:https://github.com/hackerhouse-opensource/hackerhouse-opensource

Trust: 0.1

title:Welcome to our PrintNightmare exploit Capstone writeup. What even is "PrintNightmare"? Detection Damage Control & the Recovery Process Once a System has been Compromised Mitigation and Isolation Reproduction of the exploit Related Linksurl:https://github.com/crtaylor315/legendary-invention

Trust: 0.1

title:Welcome to our PrintNightmare exploit Capstone writeup. What even is "PrintNightmare"? Detection Damage Control & the Recovery Process Once a System has been Compromised Mitigation and Isolation Reproduction of the exploit Related Linksurl:https://github.com/crtaylor315/PrintNightmare-Before-Halloween

Trust: 0.1

title:CVE-2021-34527 - PrintNightmare LPE (PowerShell)url:https://github.com/sh7alward/CVE-20121-34527-nightmare

Trust: 0.1

title:CVE-2021-34527-1675url:https://github.com/CnOxx1/CVE-2021-34527-1675

Trust: 0.1

title:PrintNightmare CVE-2021-34527url:https://github.com/powershellpr0mpt/PrintNightmare-CVE-2021-34527

Trust: 0.1

title:HardeningKittyurl:https://github.com/scipag/HardeningKitty

Trust: 0.1

title:Invoke-PrinterNightmareCheckurl:https://github.com/WiredPulse/Invoke-PrinterNightmareResponse

Trust: 0.1

title:CVE-2021-34527url:https://github.com/hackerhouse-opensource/cve-2021-34527

Trust: 0.1

title:It Was All A Dream Why? Alternatives Installation Usage Creditsurl:https://github.com/byt3bl33d3r/ItWasAllADream

Trust: 0.1

title:https://github.com/CanaanGM/cap_ze_flagurl:https://github.com/CanaanGM/cap_ze_flag

Trust: 0.1

title:CVE-2021-34527-PrintNightmare-Workaroundurl:https://github.com/geekbrett/CVE-2021-34527-PrintNightmare-Workaround

Trust: 0.1

title:Powershell serviceflipper script for Spool serviceurl:https://github.com/floridop/serviceflipper

Trust: 0.1

title:CVE-2021-34527 PrintNightmare PoC 👾url:https://github.com/d0rb/CVE-2021-34527

Trust: 0.1

title:PowerShell-Scriptsurl:https://github.com/secMK/PowerShell-Scripts

Trust: 0.1

title:HardeningKitty and Windows 10 Hardeningurl:https://github.com/0x6d69636b/windows_hardening

Trust: 0.1

title:HardeningKittyurl:https://github.com/Alssi-consulting/HardeningKitty

Trust: 0.1

title:random-scriptsurl:https://github.com/romarroca/random-scripts

Trust: 0.1

title:disable-RegisterSpoolerRemoteRpcEndPointurl:https://github.com/rdboboia/disable-RegisterSpoolerRemoteRpcEndPoint

Trust: 0.1

title:It Was All A Dream Why? Alternatives Installation Usage Creditsurl:https://github.com/VK9D/PrintNightmare

Trust: 0.1

title:PrintNightmare (CVE-2021-34527)url:https://github.com/m8sec/CVE-2021-34527

Trust: 0.1

title:PrintNightmareurl:https://github.com/synth3sis/PrintNightmare

Trust: 0.1

title:CVEurl:https://github.com/thangnguyenchien/CVE

Trust: 0.1

title:PrintNightmareurl:https://github.com/Tomparte/PrintNightmare

Trust: 0.1

title:Printnightmareurl:https://github.com/Eutectico/Printnightmare

Trust: 0.1

title:HardeningKitty and Windows 10 Hardeningurl:https://github.com/jcabrale/Windows_hardening

Trust: 0.1

title:Hacker Arsenal Tookit (HaRT)url:https://github.com/INIT6Source/Hacker-Arsenal-Toolkit

Trust: 0.1

title:Introduction Installation Usage Dependencies Features Does it require elevated privileges? References Screenshoturl:https://github.com/0xIrison/PrintNightmare-Patcher

Trust: 0.1

title:PrintNightMareChecker Screenshoturl:https://github.com/yyhh91/PrintNightMareChecker

Trust: 0.1

title:This is a scanner for the service Windows-Print-Spooler in risk Based on CVE-2021-34527 PoC originally created by cube0x0url:https://github.com/dywhoami/CVE-2021-34527-Scanner-Based-On-cube0x0-POC

Trust: 0.1

title:HardeningKittyurl:https://github.com/AdamAmicro/CAHard

Trust: 0.1

title:Invoke-PSObfuscationurl:https://github.com/gh0x0st/Invoke-PSObfuscation

Trust: 0.1

title:Offensive Cybersecurity Toolkiturl:https://github.com/chdav/offensive-cybersec-toolkit

Trust: 0.1

title:PsFix-CVE-2021-34527url:https://github.com/fardinbarashi/PsFix-CVE-2021-34527

Trust: 0.1

title:Introduction Installation Usage Dependencies Features Does it require elevated privileges? References Screenshoturl:https://github.com/0xIrison/PrinterNightmare-Patcher

Trust: 0.1

title:Introduction Installation Usage Dependencies Features Does it require elevated privileges? References Screenshoturl:https://github.com/0xirison/PrintNightmare-Patcher

Trust: 0.1

title:This is a scanner for the service Windows-Print-Spooler in risk Based on CVE-2021-34527 PoC originally created by cube0x0url:https://github.com/dywhoami/CVE-2021-34527-Scanner-NOT-Poc-Based-cube0x0

Trust: 0.1

title:PowerShell Assign-CalendarPermission.ps1: Clear-ExternalDrive.ps1: Confirm-PrintNightmare.ps1: Get-MailboxReport.ps1: Get-NetworkDriveReport.ps1: New-JabberCSV.ps1: Remove-DeletedGroup.ps1: CreateADUser: OneDrive:url:https://github.com/AdamPumphrey/PowerShell

Trust: 0.1

title:Disable-Spooler-Service-PrintNightmare-CVE-2021-34527url:https://github.com/vinaysudheer/Disable-Spooler-Service-PrintNightmare-CVE-2021-34527

Trust: 0.1

title:Trabalho_Grau_Burl:https://github.com/RafaelwDuarte/Trabalho_Grau_B

Trust: 0.1

title:PowerShell Assign-CalendarPermission.ps1: Clear-ExternalDrive.ps1: Confirm-PrintNightmare.ps1: Get-MailboxReport.ps1: Get-NetworkDriveReport.ps1: New-JabberCSV.ps1: Remove-DeletedGroup.ps1: CreateADUser: OneDrive:url:https://github.com/AdamPumphrey/Powershell

Trust: 0.1

title:CVE-2021-34527url:https://github.com/Amaranese/CVE-2021-34527

Trust: 0.1

title:PowerShell-PrintNightmareurl:https://github.com/syntaxbearror/PowerShell-PrintNightmare

Trust: 0.1

title:Invoke-PrinterNightmareCheckurl:https://github.com/WiredPulse/Invoke-PrinterNightmareCheck

Trust: 0.1

title:HardeningKittyurl:https://github.com/Gokul-C/CIS-Hardening-Windows-L1

Trust: 0.1

title:printnightmareurl:https://github.com/glorisonlai/printnightmare

Trust: 0.1

title:PrintNightmare-Windows Print Spooler RCE/LPE Vulnerability(CVE-2021-34527, CVE-2021-1675)url:https://github.com/nathanealm/PrintNightmare-Exploit

Trust: 0.1

title:CVE-2021-1675 / CVE-2021-34527 Official Guidance (Taken from CVE-2021-34527url:https://github.com/DenizSe/CVE-2021-34527

Trust: 0.1

title:PrintNightmare exploiturl:https://github.com/outflanknl/PrintNightmare

Trust: 0.1

title:SpoolSploit Disclaimer Creditsurl:https://github.com/edsonjt81/SpoolSploit

Trust: 0.1

title:Local Privilege Escalation Edition of CVE-2021-1675/CVE-2021-34527url:https://github.com/hlldz/CVE-2021-1675-LPE

Trust: 0.1

title:PrintNightmareCheckurl:https://github.com/xbufu/PrintNightmareCheck

Trust: 0.1

title:CVE-2021-1675 / CVE-2021-34527url:https://github.com/cube0x0/CVE-2021-1675

Trust: 0.1

title:SpoolSploit Disclaimer Creditsurl:https://github.com/BeetleChunks/SpoolSploit

Trust: 0.1

title:PowerSharpPackurl:https://github.com/wowter-code/PowerSharpPack

Trust: 0.1

title:CVE-2021-1675 / CVE-2021-34527url:https://github.com/edsonjt81/CVE-2021-1675

Trust: 0.1

title:microsoft-vulnerabilidades Vulnerabilidade de execução remota de código do Spooler de Impressão do Windows CVE-2021-34527 Sinopse Having NoWarningNoElevationOnInstall definido como 1 torna seu sistema vulnerável por design. Soluções alternativas Determinar se o serviço Spooler de Impressão está em execução Opção 1 — Desabilitar o serviço Spooler de Impressão Opção 2 — Desabilitar a impressão remota de entrada por meio da Política de Grupourl:https://github.com/alvesnet-suporte/microsoft-vulnerabilidades

Trust: 0.1

title:CVE-2021-1675 / CVE-2021-34527 Official Guidance (Taken from CVE-2021-34527url:https://github.com/DenizSe/CVE-2021-1675

Trust: 0.1

title:CVE-2021-1675 / CVE-2021-34527url:https://github.com/mtthwstffrd/cube0x0-CVE-2021-1675

Trust: 0.1

title:CVE-2021-1675 / CVE-2021-34527url:https://github.com/auduongxuan/CVE-2022-26809

Trust: 0.1

title:Windows Print Spooler Service RCE CVE-2021-1675 (PrintNightmare) How to disable the Print Spooler service ? CMD Shell PowerShell Service Control Referencesurl:https://github.com/ozergoker/PrintNightmare

Trust: 0.1

title:SpoolSploit Disclaimer Creditsurl:https://github.com/merlinepedra25/SpoolSploit

Trust: 0.1

title:PrintNightmare (CVE-2021-1675)url:https://github.com/corelight/CVE-2021-1675

Trust: 0.1

title:SpoolSploit Disclaimer Creditsurl:https://github.com/YAHYA950/SpoolSploit

Trust: 0.1

title:CVE-2021-1675 / CVE-2021-34527url:https://github.com/galoget/PrintNightmare-CVE-2021-1675-CVE-2021-34527

Trust: 0.1

title:Sponsored by PowerSharpPackurl:https://github.com/orgTestCodacy11KRepos110MB/repo-9265-PowerSharpPack

Trust: 0.1

title:PrintNightmareurl:https://github.com/ly4k/PrintNightmare

Trust: 0.1

title:Invoke-BuildAnonymousSMBServerurl:https://github.com/3gstudent/Invoke-BuildAnonymousSMBServer

Trust: 0.1

title:PrintNightmareurl:https://github.com/retr0-13/PrintNightmare

Trust: 0.1

title:awesome-c-sharpurl:https://github.com/uhub/awesome-c-sharp

Trust: 0.1

title:PowerSharpPackurl:https://github.com/merlinepedra25/POWERSHARPPACK

Trust: 0.1

title:PowerSharpPackurl:https://github.com/merlinepedra/POWERSHARPPACK

Trust: 0.1

title:CNightmare - CVE-2021-1675 POCurl:https://github.com/d0nkeyk0ng787/PrintNightmare-POC

Trust: 0.1

title:PrintNightmare - Windows Print Spooler RCE/LPE Vulnerability (CVE-2021-34527, CVE-2021-1675)url:https://github.com/nemo-wq/CVE-2021-1675_CVE-2021-34527_PrintNightmare

Trust: 0.1

title:CVE-2021-1675 / CVE-2021-34527 Official Guidance (Taken from CVE-2021-34527url:https://github.com/DenizSe/CVE-2020-1675

Trust: 0.1

title:Print Nightmare 分析报告url:https://github.com/hahaleyile/my-CVE-2021-1675

Trust: 0.1

title:From Lares Labs: Detection & Remediation Information for CVE-2021-1675 & CVE-2021-34527 Flow Chart Workaround Fix Sysmon Config File Splunk Queries KQL Query for Sentinel / MDE via Olaf Hartong Zeek Observations Carbon Black Hunting Query for CVE-2021-1675 Referencesurl:https://github.com/LaresLLC/CVE-2021-1675

Trust: 0.1

title:SpoolSploit Disclaimer Creditsurl:https://github.com/merlinepedra/SpoolSploit

Trust: 0.1

title:Sponsored by PowerSharpPackurl:https://github.com/oscpname/AD_PowerSharpPack

Trust: 0.1

title:cyber-ansibleurl:https://github.com/carloslacasa/cyber-ansible

Trust: 0.1

title:PrintNightmare Creditsurl:https://github.com/raithedavion/PrintNightmare

Trust: 0.1

title:CVE-2021-1675 / CVE-2021-34527url:https://github.com/eng-amarante/CyberSecurity

Trust: 0.1

title:Printnightmare Safe Toolurl:https://github.com/SSBhaumik/Printnightmare-safetool

Trust: 0.1

title:https://github.com/p0haku/cve_scraperurl:https://github.com/p0haku/cve_scraper

Trust: 0.1

title:Awesome Starsurl:https://github.com/pluja/stars

Trust: 0.1

title:PrintNightmareurl:https://github.com/ollypwn/PrintNightmare

Trust: 0.1

title:PrintNightmare - Windows Print Spooler RCE/LPE Vulnerability (CVE-2021-34527, CVE-2021-1675)url:https://github.com/nemo-wq/PrintNightmare-CVE-2021-34527

Trust: 0.1

title:TryHackMe | PrintNightmareurl:https://github.com/r1skkam/PrintNightmare

Trust: 0.1

title:Sponsored by PowerSharpPackurl:https://github.com/61106960/ClipySharpPack

Trust: 0.1

title:Sponsored by PowerSharpPackurl:https://github.com/S3cur3Th1sSh1t/PowerSharpPack

Trust: 0.1

title:RedCsharpurl:https://github.com/boh/RedCsharp

Trust: 0.1

title:CVE-2021-34527_mitigationurl:https://github.com/WidespreadPandemic/CVE-2021-34527_ACL_mitigation

Trust: 0.1

title:EVTX to MITRE Att@ckurl:https://github.com/mdecrevoisier/EVTX-to-MITRE-Attack

Trust: 0.1

title:CVE-2021-34527_mitigationurl:https://github.com/WidespreadPandemic/CVE-2021-34527_mitigation

Trust: 0.1

title:RDP Breaker Toolurl:https://github.com/Royalboy2000/codeRDPbreaker

Trust: 0.1

title:https://github.com/glshnu/PrintNightmareurl:https://github.com/glshnu/PrintNightmare

Trust: 0.1

title:SharpKatzurl:https://github.com/b4rtik/SharpKatz

Trust: 0.1

title:INTRODUCTION TO ACTIVE DIRECTORY Introduction to Active Directory Enumeration & Attacksurl:https://github.com/gecr07/HTB-Academy

Trust: 0.1

title:The Registerurl:https://www.theregister.co.uk/2021/07/16/spooler_service_local_privilege_escalation/

Trust: 0.1

title:The Registerurl:https://www.theregister.co.uk/2021/07/07/printnightmare_patched/

Trust: 0.1

title:The Registerurl:https://www.theregister.co.uk/2021/07/07/printnightmare_fix_fail/

Trust: 0.1

title:The Registerurl:https://www.theregister.co.uk/2021/07/02/printnightmare_cve/

Trust: 0.1

title:The Registerurl:https://www.theregister.co.uk/2022/03/16/russia-attack-ngo-mfa-printnightmare/

Trust: 0.1

sources: CNVD: CNVD-2021-48426 // VULMON: CVE-2021-34527 // JVNDB: JVNDB-2021-001967 // CNNVD: CNNVD-202107-137

EXTERNAL IDS

db:NVDid:CVE-2021-34527

Trust: 3.9

db:CERT/CCid:VU#383432

Trust: 2.2

db:PACKETSTORMid:167261

Trust: 1.7

db:JVNid:JVNVU96262037

Trust: 0.8

db:JVNDBid:JVNDB-2021-001967

Trust: 0.8

db:CNVDid:CNVD-2021-48426

Trust: 0.6

db:PACKETSTORMid:165024

Trust: 0.6

db:CS-HELPid:SB2021070204

Trust: 0.6

db:CXSECURITYid:WLB-2022050084

Trust: 0.6

db:CNNVDid:CNNVD-202107-137

Trust: 0.6

db:CS-HELPid:SB2021041363

Trust: 0.6

db:CNNVDid:CNNVD-202104-975

Trust: 0.6

db:VULMONid:CVE-2021-34527

Trust: 0.1

sources: CERT/CC: VU#383432 // CNVD: CNVD-2021-48426 // VULMON: CVE-2021-34527 // JVNDB: JVNDB-2021-001967 // CNNVD: CNNVD-202107-137 // CNNVD: CNNVD-202104-975 // NVD: CVE-2021-34527

REFERENCES

url:https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/cve-2021-34527

Trust: 2.3

url:http://packetstormsecurity.com/files/167261/print-spooler-remote-dll-injection.html

Trust: 2.3

url:cve-2021-1675

Trust: 0.8

url:cve-2021-34527

Trust: 0.8

url:http://jvn.jp/cert/jvnvu96262037

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2021-34527

Trust: 0.8

url:https://www.ipa.go.jp/security/ciadr/vul/20210705-ms.html

Trust: 0.8

url:https://www.jpcert.or.jp/at/2021/at210029.html

Trust: 0.8

url:https://kb.cert.org/vuls/id/383432

Trust: 0.8

url:https://us-cert.cisa.gov/ncas/current-activity/2021/06/30/printnightmare-critical-windows-print-spooler-vulnerability

Trust: 0.8

url:https://www.kb.cert.org/vuls/id/383432

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2021070204

Trust: 0.6

url:https://cxsecurity.com/issue/wlb-2022050084

Trust: 0.6

url:https://packetstormsecurity.com/files/165024/printnightmare-vulnerability.html

Trust: 0.6

url:https://msrc.microsoft.com/update-guide/vulnerability/cve-2021-34527

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2021041363

Trust: 0.6

url:https://cwe.mitre.org/data/definitions/269.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:https://www.theregister.co.uk/2021/07/07/printnightmare_patched/

Trust: 0.1

url:https://github.com/hackerhouse-opensource/hackerhouse-opensource

Trust: 0.1

url:https://advisories.checkpoint.com/defense/advisories/public/2023/cpai-2021-1666.html

Trust: 0.1

sources: CERT/CC: VU#383432 // CNVD: CNVD-2021-48426 // VULMON: CVE-2021-34527 // JVNDB: JVNDB-2021-001967 // CNNVD: CNNVD-202107-137 // CNNVD: CNNVD-202104-975 // NVD: CVE-2021-34527

CREDITS

This document was written by Will Dormann.We have not received a statement from the vendor.

Trust: 0.8

sources: CERT/CC: VU#383432

SOURCES

db:CERT/CCid:VU#383432
db:CNVDid:CNVD-2021-48426
db:VULMONid:CVE-2021-34527
db:JVNDBid:JVNDB-2021-001967
db:CNNVDid:CNNVD-202107-137
db:CNNVDid:CNNVD-202104-975
db:NVDid:CVE-2021-34527

LAST UPDATE DATE

2024-08-14T12:26:39.480000+00:00


SOURCES UPDATE DATE

db:CERT/CCid:VU#383432date:2021-08-03T00:00:00
db:CNVDid:CNVD-2021-48426date:2021-07-07T00:00:00
db:VULMONid:CVE-2021-34527date:2024-02-02T00:00:00
db:JVNDBid:JVNDB-2021-001967date:2021-07-08T08:31:00
db:CNNVDid:CNNVD-202107-137date:2022-05-26T00:00:00
db:CNNVDid:CNNVD-202104-975date:2021-04-14T00:00:00
db:NVDid:CVE-2021-34527date:2024-02-02T17:24:01.260

SOURCES RELEASE DATE

db:CERT/CCid:VU#383432date:2021-06-30T00:00:00
db:CNVDid:CNVD-2021-48426date:2021-07-07T00:00:00
db:VULMONid:CVE-2021-34527date:2021-07-02T00:00:00
db:JVNDBid:JVNDB-2021-001967date:2021-07-06T00:00:00
db:CNNVDid:CNNVD-202107-137date:2021-07-01T00:00:00
db:CNNVDid:CNNVD-202104-975date:2021-04-13T00:00:00
db:NVDid:CVE-2021-34527date:2021-07-02T22:15:08.757