CVE-2021-34527

Description from NVD

Windows Print Spooler Remote Code Execution Vulnerability

Information Acquisition Date:2022-08-28T14:48Z
CVSS 2.0: 9.0 HIGH CVSS 3.x: 8.8 HIGH

▼ CVSS3 Vec CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

▼ CVSS2 Vec AV:N/AC:L/Au:S/C:C/I:C/A:C

NVD References

 https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-34527
     source:MISC
     tags:Mitigation    Patch    Vendor Advisory    
 http://packetstormsecurity.com/files/167261/Print-Spooler-Remote-DLL-Injection.html
     source:MISC
     tags:Exploit    Third Party Advisory    VDB Entry    

This vulnerability may involve a PoC.

Description from Forti

Information Acquisition Date:2020/01/22

Affected Products

Impact

Recommended Actions

References

Refer to Information on External Sites

CVE InfomationExploits or more Infomation
mitreEXPLOIT DATABASE
NVD0day.today
vulmon.comgithub
CVE DetailsTwitter
JVN ENG JPN
Reconshell

Software Tag: Windows(5 tweets)



List of frequently cited URLs

URLNum of Times Referred to
http://vulmon.com/vulnerabilitydetails?qid=CVE3108
https://cvetrends.com50
https://lists.astaro.com/ASGV9-IPS-rules.html26
http://twinybots.ch20
https://www.security-next.com/12775213
https://www.zdnet.com/article/microsoft-adds-second-cve-for...8
https://thehackernews.com/2021/07/how-to-mitigate-microsoft...7
https://blog.truesec.com/2021/06/30/fix-for-printnightmare-...6
https://www.ipa.go.jp/security/ciadr/vul/20210705-ms.html5
http://tweetedtimes.com/Pentest101MX?s=tnp5
https://www.jpcert.or.jp/at/2021/at210029.html5
https://buff.ly/2SFGzSq4
https://youtu.be/qU3vQ-B-FPY4
https://isc.sans.edu/diary/Microsoft+Releases+Patches+for+C...4
https://www.splunk.com/en_us/blog/security/i-pity-the-spool...4
https://blog.qualys.com/vulnerabilities-threat-research/202...4
https://us-cert.cisa.gov/ncas/current-activity/2021/07/06/m...4
https://www.kaspersky.com/blog/printnightmare-vulnerability...4
https://blog.segu-info.com.ar/2021/06/poc-y-exploit-para-vu...4
https://support.microsoft.com/en-us/topic/kb5005010-restric...4
https://blog.talosintelligence.com/2021/08/vice-society-ran...4
https://bit.ly/3hNI61A3
https://ift.tt/3ym5bPf3
https://a-zs.net/cve-2021-1675/3
https://github.com/microsoft/Microsoft-365-Defender-Hunting...3
https://opsmtrs.com/33G8R113
https://twitter.com/msftsecresponse/status/14107689455906365483
https://www.cisa.gov/uscert/ncas/alerts/aa22-074a3
https://tryhackme.com/room/printnightmarehpzqlp83
https://securelist.com/quick-look-at-cve-2021-1675-cve-2021...3
https://www.mcafee.com/content/dam/enterprise/en-us/assets/...3
https://blog.0patch.com/2021/07/free-micropatches-for-print...3
https://www.kb.cert.org/vuls/id/3834323
https://www.tenable.com/blog/cve-2021-34527-microsoft-relea...3
https://cloud.google.com/kubernetes-engine/docs/release-notes3
https://blog.cymulate.com/printnightmare-cve/3
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2...3
https://securityaffairs.co/wordpress/119896/security/micros...3
https://infosecwriteups.com/exploiting-printnightmare-cve-2...3
https://www.theregister.com/2021/07/02/printnightmare_cve/3
https://www.kaspersky.com.br/blog/printnightmare-vulnerabil...3
https://msrc-blog.microsoft.com/2021/07/06/out-of-band-oob-...3
https://research.trendmicro.com/3jNxHns3
https://www.freethreatintel.com3
https://www.helpnetsecurity.com/2021/07/09/july-2021-patch-...3
https://www.bleepingcomputer.com/news/security/public-windo...3
https://empresas.blogthinkbig.com/preguntas-frecuentes-prin...3
https://ipssignatures.appspot.com/?cve=CVE-2021-345273
https://forest.watch.impress.co.jp/docs/news/1335872.html3
https://unit42.paloaltonetworks.com/cve-2021-34527-printnig...3

▼ Show Information from Twitter(14)


List of frequently cited URLs

URLNum of Times Referred to
vulmon.com3108
cvetrends.com50
lists.astaro.com26
twinybots.ch20
www.security-next.com13
www.zdnet.com8
thehackernews.com7
blog.truesec.com6
www.ipa.go.jp5
tweetedtimes.com5
www.jpcert.or.jp5
buff.ly4
youtu.be4
isc.sans.edu4
www.splunk.com4
blog.qualys.com4
us-cert.cisa.gov4
www.kaspersky.com4
blog.segu-info.com.ar4
support.microsoft.com4
blog.talosintelligence.com4
bit.ly3
ift.tt3
a-zs.net3
github.com3
opsmtrs.com3
twitter.com3
www.cisa.gov3
tryhackme.com3
securelist.com3
www.mcafee.com3
blog.0patch.com3
www.kb.cert.org3
www.tenable.com3
cloud.google.com3
blog.cymulate.com3
msrc.microsoft.com3
securityaffairs.co3
infosecwriteups.com3
www.theregister.com3
www.kaspersky.com.br3
msrc-blog.microsoft.com3
research.trendmicro.com3
www.freethreatintel.com3
www.helpnetsecurity.com3
www.bleepingcomputer.com3
empresas.blogthinkbig.com3
ipssignatures.appspot.com3
forest.watch.impress.co.jp3
unit42.paloaltonetworks.com3

▼ Show Information from Twitter(14)


GitHub Search Results: Up to 10
NameURL
cube0x0/CVE-2021-1675 https://github.com/cube0x0/CVE-2021-1675
JohnHammond/CVE-2021-34527 https://github.com/JohnHammond/CVE-2021-34527
hlldz/CVE-2021-1675-LPE https://github.com/hlldz/CVE-2021-1675-LPE
ly4k/PrintNightmare https://github.com/ly4k/PrintNightmare
nemo-wq/PrintNightmare-CVE-2021-34527 https://github.com/nemo-wq/PrintNightmare-CVE-2021-34527
m8sec/CVE-2021-34527 https://github.com/m8sec/CVE-2021-34527
byt3bl33d3r/ItWasAllADream https://github.com/byt3bl33d3r/ItWasAllADream
evilashz/CVE-2021-1675-LPE-EXP https://github.com/evilashz/CVE-2021-1675-LPE-EXP
JumpsecLabs/PrintNightmare https://github.com/JumpsecLabs/PrintNightmare
glshnu/PrintNightmare https://github.com/glshnu/PrintNightmare

GitHub Search Results: Up to 10
NameURL
cube0x0/CVE-2021-1675 github.com
JohnHammond/CVE-2021-34527 github.com
hlldz/CVE-2021-1675-LPE github.com
ly4k/PrintNightmare github.com
nemo-wq/PrintNightmare-CVE-2021-34527 github.com
m8sec/CVE-2021-34527 github.com
byt3bl33d3r/ItWasAllADream github.com
evilashz/CVE-2021-1675-LPE-EXP github.com
JumpsecLabs/PrintNightmare github.com
glshnu/PrintNightmare github.com

2023/03/13 Score : 0
Added Har-sia Database : 2021/07/02
Last Modified : 2023/03/13
Highest Scored Date : 2021/07/07
Highest Score : 287