Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2021-34481


<p>A remote code execution vulnerability exists when the Windows Print Spooler service improperly performs privileged file operations. An attacker who successfully exploited this vulnerability could run arbitrary code with SYSTEM privileges. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.</p> <p><strong>UPDATE</strong> August 10, 2021: Microsoft has completed the investigation and has released security updates to address this vulnerability. Please see the Security Updates table for the applicable update for your system. We recommend that you install these updates immediately. This security update changes the Point and Print default behavior; please see <a href="https://support.microsoft.com/help/5005652">KB5005652</a>.</p>


Published

2021-07-16T21:15:10.133

Last Modified

2024-11-21T06:10:30.303

Status

Modified

Source

[email protected]

Severity

CVSSv3.1: 8.8 (HIGH)

CVSSv2 Vector

AV:N/AC:L/Au:N/C:P/I:P/A:P

  • Access Vector: NETWORK
  • Access Complexity: LOW
  • Authentication: NONE
  • Confidentiality Impact: PARTIAL
  • Integrity Impact: PARTIAL
  • Availability Impact: PARTIAL
Exploitability Score

10.0

Impact Score

6.4

Weaknesses
  • Type: Primary
    CWE-269

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Operating System microsoft windows_10 - Yes
Operating System microsoft windows_10 20h2 Yes
Operating System microsoft windows_10 21h1 Yes
Operating System microsoft windows_10 1607 Yes
Operating System microsoft windows_10 1809 Yes
Operating System microsoft windows_10 1909 Yes
Operating System microsoft windows_10 2004 Yes
Operating System microsoft windows_7 - Yes
Operating System microsoft windows_8.1 - Yes
Operating System microsoft windows_rt_8.1 - Yes
Operating System microsoft windows_server_2008 - Yes
Operating System microsoft windows_server_2008 r2 Yes
Operating System microsoft windows_server_2012 - Yes
Operating System microsoft windows_server_2016 - Yes
Operating System microsoft windows_server_2016 2004 Yes
Operating System microsoft windows_server_2019 - Yes

References