7.8 CVE-2021-1675
Enriched by CISA CISA Kev Catalog Patch Exploit
Windows Print Spooler Remote Code Execution Vulnerability
https://nvd.nist.gov/vuln/detail/CVE-2021-1675
Categories
CWE-NVD-Other
References
134c704f-9b21-4f2e-91b3-4a467353bcc0
| https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-20... US Government Resource |
af854a3a-2127-422b-91ae-364da2661108 Patch Exploit
| http://packetstormsecurity.com/files/163349/Microsoft-PrintNightmare-Proof-Of... Third Party Advisory VDB Entry |
| http://packetstormsecurity.com/files/163351/PrintNightmare-Windows-Spooler-Se... Third Party Advisory VDB Entry |
| http://packetstormsecurity.com/files/167261/Print-Spooler-Remote-DLL-Injectio... Exploit Third Party Advisory VDB Entry |
| https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-1675 Patch Vendor Advisory |
| https://www.kb.cert.org/vuls/id/383432 Third Party Advisory US Government Resource |
secure@microsoft.com Patch Exploit
| http://packetstormsecurity.com/files/163349/Microsoft-PrintNightmare-Proof-Of... Third Party Advisory VDB Entry |
| http://packetstormsecurity.com/files/163351/PrintNightmare-Windows-Spooler-Se... Third Party Advisory VDB Entry |
| http://packetstormsecurity.com/files/167261/Print-Spooler-Remote-DLL-Injectio... Exploit Third Party Advisory VDB Entry |
| https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-1675 Patch Vendor Advisory |
| https://www.kb.cert.org/vuls/id/383432 Third Party Advisory US Government Resource |
AFFECTED (from MITRE)
| Vendor | Product | Versions |
|---|---|---|
| Microsoft | Windows 10 Version 1809 |
|
| Microsoft | Windows Server 2019 |
|
| Microsoft | Windows Server 2019 (Server Core installation) |
|
| Microsoft | Windows 10 Version 1909 |
|
| Microsoft | Windows 10 Version 21H1 |
|
| Microsoft | Windows 10 Version 2004 |
|
| Microsoft | Windows Server version 2004 |
|
| Microsoft | Windows 10 Version 20H2 |
|
| Microsoft | Windows Server version 20H2 |
|
| Microsoft | Windows 10 Version 1507 |
|
| Microsoft | Windows 10 Version 1607 |
|
| Microsoft | Windows Server 2016 |
|
| Microsoft | Windows Server 2016 (Server Core installation) |
|
| Microsoft | Windows 7 |
|
| Microsoft | Windows 7 Service Pack 1 |
|
| Microsoft | Windows 8.1 |
|
| Microsoft | Windows Server 2008 Service Pack 2 |
|
| Microsoft | Windows Server 2008 Service Pack 2 (Server Core installation) |
|
| Microsoft | Windows Server 2008 Service Pack 2 |
|
| Microsoft | Windows Server 2008 R2 Service Pack 1 |
|
| Microsoft | Windows Server 2008 R2 Service Pack 1 (Server Core installation) |
|
| Microsoft | Windows Server 2012 |
|
| Microsoft | Windows Server 2012 (Server Core installation) |
|
| Microsoft | Windows Server 2012 R2 |
|
| Microsoft | Windows Server 2012 R2 (Server Core installation) |
|
| © 2022 The MITRE Corporation. This work is reproduced and distributed with the permission of The MITRE Corporation. | ||
CPE
| cpe | start | end |
|---|---|---|
| Configuration 1 | ||
| cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:*:* | < 10.0.10240.18967 | |
| cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:*:* | < 10.0.14393.4467 | |
| cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:* | < 10.0.17763.1999 | |
| cpe:2.3:o:microsoft:windows_10_1909:*:*:*:*:*:*:*:* | < 10.0.18363.1621 | |
| cpe:2.3:o:microsoft:windows_10_2004:*:*:*:*:*:*:*:* | < 10.0.19041.1052 | |
| cpe:2.3:o:microsoft:windows_10_20h2:*:*:*:*:*:*:*:* | < 10.0.19042.1052 | |
| cpe:2.3:o:microsoft:windows_10_21h1:*:*:*:*:*:*:*:* | < 10.0.19043.1052 | |
| cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:* | ||
| cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:microsoft:windows_server_2004:*:*:*:*:*:*:*:* | < 10.0.19041.1052 | |
| cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:* | ||
| cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:* | ||
| cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:* | ||
| cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:* | < 10.0.14393.4467 | |
| cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:* | < 10.0.17763.1999 | |
REMEDIATION
Patch
| Url |
|---|
| https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-1675 |
| https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-1675 |
EXPLOITS
Exploit-db.com
| id | description | date | |
|---|---|---|---|
| No known exploits | |||
POC Github
Other Nist (github, ...)
| Url |
|---|
| http://packetstormsecurity.com/files/167261/Print-Spooler-Remote-DLL-Injectio... |
| http://packetstormsecurity.com/files/167261/Print-Spooler-Remote-DLL-Injectio... |
CAPEC
Common Attack Pattern Enumerations and Classifications
| id | description | severity |
|---|---|---|
| No entry | ||
Cybersecurity needs ?
Strengthen software security from the outset with our DevSecOps expertise
Integrate security right from the start of the software development cycle for more robust applications and greater customer confidence.
Our team of DevSecOps experts can help you secure your APIs, data pipelines, CI/CD chains, Docker containers and Kubernetes deployments.
