CVE-2021-1675

Windows Print Spooler Remote Code Execution Vulnerability
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_10_1909:*:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_10_2004:*:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_10_20h2:*:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_10_21h1:*:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2004:*:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*
cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*

History

21 Nov 2024, 05:44

Type Values Removed Values Added
References () http://packetstormsecurity.com/files/163349/Microsoft-PrintNightmare-Proof-Of-Concept.html - Third Party Advisory, VDB Entry () http://packetstormsecurity.com/files/163349/Microsoft-PrintNightmare-Proof-Of-Concept.html - Third Party Advisory, VDB Entry
References () http://packetstormsecurity.com/files/163351/PrintNightmare-Windows-Spooler-Service-Remote-Code-Execution.html - Third Party Advisory, VDB Entry () http://packetstormsecurity.com/files/163351/PrintNightmare-Windows-Spooler-Service-Remote-Code-Execution.html - Third Party Advisory, VDB Entry
References () http://packetstormsecurity.com/files/167261/Print-Spooler-Remote-DLL-Injection.html - Exploit, Third Party Advisory, VDB Entry () http://packetstormsecurity.com/files/167261/Print-Spooler-Remote-DLL-Injection.html - Exploit, Third Party Advisory, VDB Entry
References () https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-1675 - Patch, Vendor Advisory () https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-1675 - Patch, Vendor Advisory
References () https://www.kb.cert.org/vuls/id/383432 - Third Party Advisory, US Government Resource () https://www.kb.cert.org/vuls/id/383432 - Third Party Advisory, US Government Resource

29 Jul 2024, 17:57

Type Values Removed Values Added
First Time Microsoft windows 10 2004
Microsoft windows 10 21h1
Microsoft windows 10 1809
Microsoft windows 10 1507
Microsoft windows Server 2004
Microsoft windows 10 1909
Microsoft windows 10 20h2
Microsoft windows 10 1607
CPE cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_10:2004:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_10_1909:*:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_10_20h2:*:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_10_2004:*:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_10_21h1:*:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2004:*:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*

08 Aug 2023, 14:22

Type Values Removed Values Added
CWE CWE-269 NVD-CWE-Other

01 Aug 2023, 23:15

Type Values Removed Values Added
Summary Windows Print Spooler Elevation of Privilege Vulnerability Windows Print Spooler Remote Code Execution Vulnerability
CVSS v2 : 9.3
v3 : 8.8
v2 : 9.3
v3 : 7.8

Information

Published : 2021-06-08 23:15

Updated : 2024-11-21 05:44


NVD link : CVE-2021-1675

Mitre link : CVE-2021-1675

CVE.ORG link : CVE-2021-1675


JSON object : View

Products Affected

microsoft

  • windows_10_2004
  • windows_10_21h1
  • windows_10_1507
  • windows_7
  • windows_10_1909
  • windows_server_2004
  • windows_8.1
  • windows_10_20h2
  • windows_rt_8.1
  • windows_10_1809
  • windows_10_1607
  • windows_server_2016
  • windows_server_2019
  • windows_server_2012
  • windows_server_2008