vulnerability
Microsoft Windows: CVE-2021-34527: Windows Print Spooler Remote Code Execution Vulnerability
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
9 | (AV:N/AC:L/Au:S/C:C/I:C/A:C) | 2021-07-01 | 2021-07-07 | 2025-04-29 |
Severity
9
CVSS
(AV:N/AC:L/Au:S/C:C/I:C/A:C)
Published
2021-07-01
Added
2021-07-07
Modified
2025-04-29
Description
Windows Print Spooler Remote Code Execution Vulnerability
Solution(s)
microsoft-windows-windows_10-1507-kb5004950microsoft-windows-windows_10-1607-kb5004948microsoft-windows-windows_10-1809-kb5004947microsoft-windows-windows_10-20h2-kb5004945microsoft-windows-windows_10-21h2-kb5008212microsoft-windows-windows_10-22h2-kb5019959microsoft-windows-windows_11-21h2-kb5007215microsoft-windows-windows_11-22h2-kb5018427microsoft-windows-windows_server_2012-kb5004960microsoft-windows-windows_server_2012_r2-kb5004954microsoft-windows-windows_server_2012_r2-kb5004958microsoft-windows-windows_server_2016-1607-kb5004948microsoft-windows-windows_server_2019-1809-kb5004947microsoft-windows-windows_server_2022-21h2-kb5005575microsoft-windows-windows_server_2022-22h2-kb5005575msft_disable_point_and_printmsft-kb5004945-34acf687-8553-4735-8510-5e50d4ae1b03msft-kb5004945-bfda051c-3d7e-4fc9-a77b-bdc1923c55f5msft-kb5004951-4cf104b2-73cc-4b31-af64-0897ed112d42msft-kb5004951-7b4b8daf-938e-4f81-b6b8-deeca71982f1msft-kb5004951-a6e1a05a-cc4b-4abe-89f3-ef967120e962msft-kb5004951-c4358f91-9c5e-47cc-8fc0-5126762508cemsft-kb5004951-f8d7df81-e562-410e-8a99-5b91dc431389msft-kb5004958-872e8b44-3e08-4c38-85fb-bb6c0fe500fdmsft-kb5004958-b474a9ae-2fed-49b4-a8ca-1f19224147ecmsft-kb5004959-5dc1c57a-bebd-40bd-8267-a53f7e5ee00fmsft-kb5004959-9648ba0a-50d8-4ba0-91be-0d7e150e56bamsft-kb5004960-f59cc932-12a9-46ef-bdf1-cfb2f5ffcba0msft-kb5004960-ff6ce56e-6f94-487f-b56a-4a9676065cbe
References
- CVE-2021-34527
- https://attackerkb.com/topics/CVE-2021-34527
- URL-https://attackerkb.com/topics/MIHLz4sY3s/cve-2021-34527-printnightmare
- URL-https://support.microsoft.com/help/5004945
- URL-https://support.microsoft.com/help/5004947
- URL-https://support.microsoft.com/help/5004948
- URL-https://support.microsoft.com/help/5004950
- URL-https://support.microsoft.com/help/5004954
- URL-https://support.microsoft.com/help/5004958
- URL-https://support.microsoft.com/help/5004960
- URL-https://support.microsoft.com/help/5005575
- URL-https://support.microsoft.com/help/5007215
- URL-https://support.microsoft.com/help/5008212
- URL-https://support.microsoft.com/help/5018427
- URL-https://support.microsoft.com/help/5019959
- URL-https://www.rapid7.com/blog/post/2021/06/30/cve-2021-1675-printnightmare-patch-does-not-remediate-vulnerability/

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.