⚠ Actively exploited in ransomware campaigns
This vulnerability is on the CISA Known Exploited Vulnerabilities list and has been used in known ransomware attacks. CISA required action: Apply updates per vendor instructions.. Due date: 2021-11-17.

CVE-2021-1675

Severity
7.8HIGH
EPSS
94.3%
top 0.05%
CISA KEV
KEVRansomware
Added 2021-11-03
Due 2021-11-17
Exploit
Exploited in wild
Active exploitation observed
Timeline
PublishedJun 8
KEV addedNov 3
KEV dueNov 17
Latest updateDec 6
CISA Required Action: Apply updates per vendor instructions.

Description

Windows Print Spooler Remote Code Execution Vulnerability

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9

Affected Packages32 packages

NVDmicrosoft/windows< 10.0.19041.1052+3
CVEListV5microsoft/windows_76.1.06.1.7601.25632
CVEListV5microsoft/windows_8.16.3.06.3.9600.20045+1
NVDmicrosoft/windows_10_1507< 10.0.10240.18967
NVDmicrosoft/windows_10_1607< 10.0.14393.4467

Patches

🔴Vulnerability Details

3
GHSA
GHSA-vwmm-qq95-vqhf: Windows Print Spooler Elevation of Privilege Vulnerability2022-05-24
CVEList
Windows Print Spooler Remote Code Execution Vulnerability2021-06-08
VulnCheck
Microsoft Windows Print Spooler Remote Code Execution Vulnerability2021

🔍Detection Rules

1
Sigma
Suspicious Rejected SMB Guest Logon From IP

📋Vendor Advisories

2
CISA
Microsoft Windows Print Spooler Remote Code Execution Vulnerability2021-11-03
Microsoft
Windows Print Spooler Remote Code Execution Vulnerability2021-06-08

🕵️Threat Intelligence

14
Unit42
Vice Society: Profiling a Persistent Threat to the Education Sector2022-12-06
Talos
Vice Society leverages PrintNightmare in ransomware attacks2021-08-12
Talos
Vice Society leverages PrintNightmare in ransomware attacks2021-08-12
Unit42
Threat Brief: Windows Print Spooler RCE Vulnerability (CVE-2021-34527 AKA PrintNightmare)2021-07-14
Sentinelone
PrintNightmare Vulnerability: Analysis and Mitigation2021-07-14
CVE-2021-1675 (HIGH CVSS 7.8) | Windows Print Spooler Remote Code E | cvebase.io