CVE-2021-1675

Description from NVD

Windows Print Spooler Elevation of Privilege Vulnerability

Information Acquisition Date:2022-09-13T14:48Z
CVSS 2.0: 9.3 HIGH CVSS 3.x: 8.8 HIGH

▼ CVSS3 Vec CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

▼ CVSS2 Vec AV:N/AC:M/Au:N/C:C/I:C/A:C

NVD References

 https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-1675
     source:MISC
     tags:Patch    Vendor Advisory    
 VU#383432
     source:CERT-VN
     tags:Third Party Advisory    US Government Resource    
 http://packetstormsecurity.com/files/163351/PrintNightmare-Windows-Spooler-Service-Remote-Code-Execution.html
     source:MISC
     tags:Third Party Advisory    VDB Entry    
 http://packetstormsecurity.com/files/163349/Microsoft-PrintNightmare-Proof-Of-Concept.html
     source:MISC
     tags:Third Party Advisory    VDB Entry    
 http://packetstormsecurity.com/files/167261/Print-Spooler-Remote-DLL-Injection.html
     source:MISC
     tags:Exploit    Third Party Advisory    VDB Entry    

This vulnerability may involve a PoC.

Description from Forti

Microsoft: Windows Print Spooler Elevation of Privilege Vulnerability

Information Acquisition Date:2021/07/07

Affected Products

Impact

Recommended Actions

References

Refer to Information on External Sites

CVE InfomationExploits or more Infomation
mitreEXPLOIT DATABASE
NVD0day.today
vulmon.comgithub
CVE DetailsTwitter
JVN ENG JPN
Reconshell

Software Tag:



List of frequently cited URLs

URLNum of Times Referred to
http://vulmon.com/vulnerabilitydetails?qid=CVE-20212702
https://alerts.vulmon.com/?utm_source=twitter&utm_medium=so...270
https://cvetrends.com51
http://twinybots.ch42
https://securityaffairs.co/wordpress/119502/hacking/2021-16...19
https://twitter.com/_f0rgetting_/status/140511928580289741014
https://www.zdnet.com/article/microsoft-adds-second-cve-for...8
https://www.kb.cert.org/vuls/id/3834328
https://www.tenable.com/blog/cve-2021-1675-proof-of-concept...8
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2...7
https://noticiasseguridad.com/vulnerabilidades/cve-2021-167...7
https://bit.ly/3jH8pZF6
https://therecord.media/poc-released-for-dangerous-windows-...5
https://doublepulsar.com/zero-day-for-every-supported-windo...5
https://www.jpcert.or.jp/at/2021/at210029.html5
https://www.helpnetsecurity.com/2021/06/30/poc-cve-2021-1675/5
https://forest.watch.impress.co.jp/docs/news/1335872.html5
https://youtu.be/qU3vQ-B-FPY4
https://binalyze.com/print-nightmare-bug-scanner-remediator...4
https://thalpius.com/2021/07/16/windows-print-spooler-eleva...4
https://threatpost.com/cisa-mitigation-printnightmare-bug/1...4
https://us-cert.cisa.gov/ncas/current-activity/2021/06/30/p...4
https://www.kaspersky.com/blog/printnightmare-vulnerability...4
http://blog.segu-info.com.ar/2021/06/poc-y-exploit-para-vul...4
https://support.microsoft.com/en-us/topic/kb5005010-restric...4
https://blog.talosintelligence.com/2021/08/vice-society-ran...4
https://ift.tt/3AeE8aB3
https://a-zs.net/cve-2021-1675/3
https://github.com/afwu/PrintNightmare3
https://msandbu.org/printnightmare-cve-2021-1675/3
https://www.nukib.cz/cs/infoservis/hrozby/1729-upozorneni-n...3
https://tryhackme.com/room/printnightmarehpzqlp83
https://securelist.com/quick-look-at-cve-2021-1675-cve-2021...3
https://www.mcafee.com/content/dam/enterprise/en-us/assets/...3
https://www.rapid7.com/blog/post/2021/06/30/cve-2021-1675-p...3
http://CVE-2021-1675.py3
https://blog.truesec.com/2021/06/30/exploitable-critical-rc...3
http://tweetedtimes.com/infowaropcenter?s=tnp3
https://www.secpoint.com/penetrator.html3
https://thehackernews.com/2021/06/researchers-leak-poc-expl...3
https://www.deepwatch.com/blog/cve-2021-1675-poc-released-f...3
https://infosecwriteups.com/exploiting-printnightmare-cve-2...3
https://www.kaspersky.com.br/blog/printnightmare-vulnerabil...3
https://www.securityweek.com/windows-admins-scrambling-cont...3
https://github.motakasoft.com/trending/?d=2021-07-03&l=c3
https://www.security-next.com/1277523
https://www.blog.afine.academy/exploit-na-windowsa-10-czyli...3
https://packetstormsecurity.com/files/163349/CVE-2021-1675-...3
https://research.trendmicro.com/3jNxHns3
https://www.bleepingcomputer.com/news/security/public-windo...3
https://ipssignatures.appspot.com/?cve=CVE-2021-16753

Information from Twitter

User URL Info Source Date
chrisra81893232 https://github.com/cube0x0/CVE-2021-1675 Source chrisra81893232 1612814487165276161 2023/01/10

List of frequently cited URLs

URLNum of Times Referred to
vulmon.com2702
alerts.vulmon.com270
cvetrends.com51
twinybots.ch42
securityaffairs.co19
twitter.com14
www.zdnet.com8
www.kb.cert.org8
www.tenable.com8
msrc.microsoft.com7
noticiasseguridad.com7
bit.ly6
therecord.media5
doublepulsar.com5
www.jpcert.or.jp5
www.helpnetsecurity.com5
forest.watch.impress.co.jp5
youtu.be4
binalyze.com4
thalpius.com4
threatpost.com4
us-cert.cisa.gov4
www.kaspersky.com4
blog.segu-info.com.ar4
support.microsoft.com4
blog.talosintelligence.com4
ift.tt3
a-zs.net3
github.com3
msandbu.org3
www.nukib.cz3
tryhackme.com3
securelist.com3
www.mcafee.com3
www.rapid7.com3
CVE-2021-1675.py3
blog.truesec.com3
tweetedtimes.com3
www.secpoint.com3
thehackernews.com3
www.deepwatch.com3
infosecwriteups.com3
www.kaspersky.com.br3
www.securityweek.com3
github.motakasoft.com3
www.security-next.com3
www.blog.afine.academy3
packetstormsecurity.com3
research.trendmicro.com3
www.bleepingcomputer.com3
ipssignatures.appspot.com3

Information from Twitter

User URL Info Source
chrisra81893232 github.com Show Tweet

GitHub Search Results: Up to 10
NameURL
cube0x0/CVE-2021-1675 https://github.com/cube0x0/CVE-2021-1675
calebstewart/CVE-2021-1675 https://github.com/calebstewart/CVE-2021-1675
hlldz/CVE-2021-1675-LPE https://github.com/hlldz/CVE-2021-1675-LPE
LaresLLC/CVE-2021-1675 https://github.com/LaresLLC/CVE-2021-1675
sailay1996/PrintNightmare-LPE https://github.com/sailay1996/PrintNightmare-LPE
ly4k/PrintNightmare https://github.com/ly4k/PrintNightmare
mstxq17/CVE-2021-1675_RDL_LPE https://github.com/mstxq17/CVE-2021-1675_RDL_LPE
evilashz/CVE-2021-1675-LPE-EXP https://github.com/evilashz/CVE-2021-1675-LPE-EXP
nemo-wq/PrintNightmare-CVE-2021-34527 https://github.com/nemo-wq/PrintNightmare-CVE-2021-34527
cybersecurityworks553/CVE-2021-1675_PrintNightMare https://github.com/cybersecurityworks553/CVE-2021-1675_PrintNightMare

GitHub Search Results: Up to 10
NameURL
cube0x0/CVE-2021-1675 github.com
calebstewart/CVE-2021-1675 github.com
hlldz/CVE-2021-1675-LPE github.com
LaresLLC/CVE-2021-1675 github.com
sailay1996/PrintNightmare-LPE github.com
ly4k/PrintNightmare github.com
mstxq17/CVE-2021-1675_RDL_LPE github.com
evilashz/CVE-2021-1675-LPE-EXP github.com
nemo-wq/PrintNightmare-CVE-2021-34527 github.com
cybersecurityworks553/CVE-2021-1675_PrintNightMare github.com

2023/02/16 Score : 0
Added Har-sia Database : 2021/06/09
Last Modified : 2023/02/16
Highest Scored Date : 2021/07/01
Highest Score : 408