7.8 CVE-2021-1675

Enriched by CISA CISA Kev Catalog Patch Exploit
 

Windows Print Spooler Remote Code Execution Vulnerability
https://nvd.nist.gov/vuln/detail/CVE-2021-1675

Categories

CWE-NVD-Other

References


 

AFFECTED (from MITRE)


Vendor Product Versions
Microsoft Windows 10 Version 1809
  • 10.0.0 < 10.0.17763.1999 [affected]
Microsoft Windows Server 2019
  • 10.0.0 < 10.0.17763.1999 [affected]
Microsoft Windows Server 2019 (Server Core installation)
  • 10.0.0 < 10.0.17763.1999 [affected]
Microsoft Windows 10 Version 1909
  • 10.0.0 < 10.0.18363.1621 [affected]
Microsoft Windows 10 Version 21H1
  • 10.0.0 < 10.0.19043.1052 [affected]
Microsoft Windows 10 Version 2004
  • 10.0.0 < 10.0.19041.1052 [affected]
Microsoft Windows Server version 2004
  • 10.0.0 < 10.0.19041.1052 [affected]
Microsoft Windows 10 Version 20H2
  • 10.0.0 < 10.0.19042.1052 [affected]
Microsoft Windows Server version 20H2
  • 10.0.0 < 10.0.19042.1052 [affected]
Microsoft Windows 10 Version 1507
  • 10.0.0 < 10.0.10240.18967 [affected]
Microsoft Windows 10 Version 1607
  • 10.0.0 < 10.0.14393.4467 [affected]
Microsoft Windows Server 2016
  • 10.0.0 < 10.0.14393.4467 [affected]
Microsoft Windows Server 2016 (Server Core installation)
  • 10.0.0 < 10.0.14393.4467 [affected]
Microsoft Windows 7
  • 6.1.0 < 6.1.7601.25632 [affected]
Microsoft Windows 7 Service Pack 1
  • 6.1.0 < 6.1.7601.25632 [affected]
Microsoft Windows 8.1
  • 6.3.0 < 6.3.9600.20045 [affected]
  • 6.3.0 < 6.3.9600.20044 [affected]
Microsoft Windows Server 2008 Service Pack 2
  • 6.0.0 < 6.0.6003.21137 [affected]
Microsoft Windows Server 2008 Service Pack 2 (Server Core installation)
  • 6.0.0 < 6.0.6003.21137 [affected]
Microsoft Windows Server 2008 Service Pack 2
  • 6.0.0 < 6.0.6003.21137 [affected]
Microsoft Windows Server 2008 R2 Service Pack 1
  • 6.1.0 < 6.1.7601.25632 [affected]
Microsoft Windows Server 2008 R2 Service Pack 1 (Server Core installation)
  • 6.0.0 < 6.1.7601.25632 [affected]
Microsoft Windows Server 2012
  • 6.2.0 < 6.2.9200.23372 [affected]
Microsoft Windows Server 2012 (Server Core installation)
  • 6.2.0 < 6.2.9200.23372 [affected]
Microsoft Windows Server 2012 R2
  • 6.3.0 < 6.3.9600.20045 [affected]
  • 6.3.0 < 6.3.9600.20044 [affected]
Microsoft Windows Server 2012 R2 (Server Core installation)
  • 6.3.0 < 6.3.9600.20045 [affected]
  • 6.3.0 < 6.3.9600.20044 [affected]
© 2022 The MITRE Corporation. This work is reproduced and distributed with the permission of The MITRE Corporation.

CPE

cpe start end
Configuration 1
cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:*:* < 10.0.10240.18967
cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:*:* < 10.0.14393.4467
cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:* < 10.0.17763.1999
cpe:2.3:o:microsoft:windows_10_1909:*:*:*:*:*:*:*:* < 10.0.18363.1621
cpe:2.3:o:microsoft:windows_10_2004:*:*:*:*:*:*:*:* < 10.0.19041.1052
cpe:2.3:o:microsoft:windows_10_20h2:*:*:*:*:*:*:*:* < 10.0.19042.1052
cpe:2.3:o:microsoft:windows_10_21h1:*:*:*:*:*:*:*:* < 10.0.19043.1052
cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2004:*:*:*:*:*:*:*:* < 10.0.19041.1052
cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*
cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:* < 10.0.14393.4467
cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:* < 10.0.17763.1999


REMEDIATION


Patch

Url
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-1675
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-1675


EXPLOITS


Exploit-db.com

id description date
No known exploits

POC Github

Url
https://github.com/cube0x0/CVE-2021-1675
https://github.com/puckiestyle/CVE-2021-1675
https://github.com/edsonjt81/CVE-2021-1675
https://github.com/galoget/PrintNightmare-CVE-2021-1675-CVE-2021-34527
https://github.com/TheJoyOfHacking/cube0x0-CVE-2021-1675
https://github.com/ccordeiro/CVE-2021-1675

Other Nist (github, ...)

Url
http://packetstormsecurity.com/files/167261/Print-Spooler-Remote-DLL-Injectio...
http://packetstormsecurity.com/files/167261/Print-Spooler-Remote-DLL-Injectio...


CAPEC


Common Attack Pattern Enumerations and Classifications

id description severity
No entry