KEMBAR78
Error | PDF | Windows Server 2008 | Microsoft Windows
0% found this document useful (0 votes)
20 views125 pages

Error

The document is a web page for a vulnerability lookup service that provides fast correlation of vulnerabilities from various sources. It includes navigation elements, recent vulnerability links, and a search function for users to find specific vulnerabilities or vendors. The page is structured with Bootstrap for responsive design and includes various scripts and styles for enhanced functionality and user experience.

Uploaded by

bent65015
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
20 views125 pages

Error

The document is a web page for a vulnerability lookup service that provides fast correlation of vulnerabilities from various sources. It includes navigation elements, recent vulnerability links, and a search function for users to find specific vulnerabilities or vendors. The page is structured with Bootstrap for responsive design and includes various scripts and styles for enhanced functionality and user experience.

Uploaded by

bent65015
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
You are on page 1/ 125

Status Code: 200

Response Text:

<!doctype html>
<html lang="en" data-bs-theme="light">
<head>

<!-- Required meta tags -->


<meta charset="utf-8">
<meta name="viewport" content="width=device-width, initial-scale=1, shrink-to-
fit=no">
<meta name="description" content="Vulnerability-Lookup - Fast vulnerability
lookup correlation from different sources." />
<link rel="author" type="text/plain" href="/humans.txt" />
<link href="/recent/all.atom" rel="alternate" title="Recent vulnerabilities."
type="application/atom+xml">
<link href="/recent/cvelistv5.atom" rel="alternate" title="Recent
vulnerabilities from cvelistv5." type="application/atom+xml">
<link href="/recent/fkie_nvd.atom" rel="alternate" title="Recent
vulnerabilities from FKIE NVD." type="application/atom+xml">
<link href="/recent/github.atom" rel="alternate" title="Recent vulnerabilities
from github." type="application/atom+xml">
<link href="/recent/pysec.atom" rel="alternate" title="Recent vulnerabilities
from pysec." type="application/atom+xml">
<link href="/recent/ossf_malicious_packages.atom" rel="alternate" title="Recent
vulnerabilities from ossf_malicious_packages." type="application/atom+xml">
<link href="/recent/csaf_certbund.atom" rel="alternate" title="Recent
vulnerabilities from csaf_certbund." type="application/atom+xml">
<link href="/recent/csaf_siemens.atom" rel="alternate" title="Recent
vulnerabilities from csaf_siemens." type="application/atom+xml">
<link href="/recent/csaf_redhat.atom" rel="alternate" title="Recent
vulnerabilities from csaf_redhat." type="application/atom+xml">
<link href="/recent/csaf_cisa.atom" rel="alternate" title="Recent
vulnerabilities from csaf_cisa." type="application/atom+xml">
<link href="/recent/csaf_cisco.atom" rel="alternate" title="Recent
vulnerabilities from csaf_cisco." type="application/atom+xml">
<link href="/recent/csaf_sick.atom" rel="alternate" title="Recent
vulnerabilities from csaf_sick." type="application/atom+xml">
<link href="/recent/csaf_ox.atom" rel="alternate" title="Recent vulnerabilities
from csaf_ox." type="application/atom+xml">
<link href="/recent/csaf_nozominetworks.atom" rel="alternate" title="Recent
vulnerabilities from csaf_nozominetworks." type="application/atom+xml">
<link href="/recent/csaf_microsoft.atom" rel="alternate" title="Recent
vulnerabilities from csaf_microsoft." type="application/atom+xml">
<link href="/recent/gsd.atom" rel="alternate" title="Recent vulnerabilities
from gsd." type="application/atom+xml">
<link href="/recent/jvndb.atom" rel="alternate" title="Recent vulnerabilities
from jvndb." type="application/atom+xml">
<link href="/recent/tailscale.atom" rel="alternate" title="Recent
vulnerabilities from tailscale." type="application/atom+xml">
<link href="/recent/csaf_ncscnl.atom" rel="alternate" title="Recent
vulnerabilities from csaf_ncscnl." type="application/atom+xml">

<!-- Standard favicon -->


<link rel="icon" type="image/x-icon" href="/static/img/favicon.ico">

<!-- PNG favicon (modern browsers) -->


<link rel="icon" type="image/png" sizes="48x48" href="/static/img/favicon-
48x48.png">
<link rel="icon" type="image/png" sizes="32x32" href="/static/img/favicon-
32x32.png">
<link rel="icon" type="image/png" sizes="16x16" href="/static/img/favicon-
16x16.png">

<!-- Apple Touch Icons -->


<link rel="apple-touch-icon" sizes="57x57" href="/static/img/apple-touch-icon-
57x57.png">
<link rel="apple-touch-icon" sizes="72x72" href="/static/img/apple-touch-icon-
72x72.png">
<link rel="apple-touch-icon" sizes="114x114" href="/static/apple-touch-icon-
114x114.png">
<link rel="apple-touch-icon" sizes="120x120" href="/static/img/apple-touch-
icon-120x120.png">
<link rel="apple-touch-icon" sizes="144x144" href="/static/img/apple-touch-
icon-144x144.png">
<link rel="apple-touch-icon" sizes="152x152" href="/static/img/apple-touch-
icon-152x152.png">
<link rel="apple-touch-icon" sizes="180x180" href="/static/img/apple-touch-
icon-180x180.png">

<script>
function getCookie(name) {
var nameEQ = name + "=";
var ca = document.cookie.split(';');
for(var i=0;i < ca.length;i++) {
var c = ca[i];
while (c.charAt(0)==' ') c = c.substring(1,c.length);
if (c.indexOf(nameEQ) == 0) return c.substring(nameEQ.length,c.length);
}
return null;
}

if (getCookie("theme") == null) {
document.cookie = "theme=light; path=/; SameSite=Strict";
}
document.documentElement.setAttribute('data-bs-theme', getCookie("theme"));
</script>

<!-- Bootstrap CSS -->


<link rel="stylesheet" href="/bootstrap/static/css/bootstrap.min.css">
<style>
#freetext_search {
max-width: 100%; /* Prevent overflow */
}
</style>
<link rel="stylesheet" href="/static/css/theme.css" />

<title>cvelistv5 - CVE-2021-34527</title>

<script src="/static/js/showdown.min.js"></script>
<script src="/static/js/lodash.min.js"></script>
<script src="/static/js/luxon.min.js"></script>
<script src="/static/js/jsoneditor.min.js"></script>
<script src="/static/js/pretty-print-json.min.js"></script>
<script src="/static/js/easymde.min.js"></script>
<script src="/static/js/luxon.min.js"></script>
<script src="/static/js/chart.js"></script>
<script src="/static/js/utils.js"></script>
<script src="/static/js/plots.js"></script>
<script src="/static/js/d3.v7.min.js"></script>
<link rel="stylesheet" href="/static/css/easymde.min.css" />
<link rel="stylesheet" href="/static/css/pretty-print-json.css" />
<style>
/* Optional styling to indicate clickable header */
th {
cursor: pointer;
}
.chevron {
font-size: 18px;
color: #446d80; /* Change to the color you want */
}

/* Style to make the chart scrollable horizontally */


.chart-container {
position: relative; /* Required for positioning */
width: 100%; /* Make it responsive */
height: 400px; /* Set a specific height for the chart */
overflow-x: auto; /* Enable horizontal scroll */
}
canvas {
width: 100% !important; /* Make the canvas take full width */
height: auto !important; /* Allow the height to adjust automatically */
}
</style>

</head>
<body>
<header>
<div class="container">

<nav class="navbar navbar-expand-lg">


<div class="container-fluid">
<a class="navbar-brand " href="/">
<img
id="vulnerability-lookup-logo"
src="/static/img/VL-hori-coul.png"
alt="Vulnerability-Lookup"
title="Vulnerability-Lookup"
height="50px"
/>
</a>
<button class="navbar-toggler" type="button" data-bs-toggle="collapse"
data-bs-target="#navbarNav" aria-controls="navbarNav" aria-expanded="false" aria-
label="Toggle navigation">
<span class="navbar-toggler-icon"></span>
</button>
<div class="collapse navbar-collapse" id="navbarNav">
<ul class="navbar-nav mr-auto w-100 justify-content-end">

<li class="nav-item">
<a class="nav-link" id="btnThemeSwitch" href="#" title="Switch to
dark theme">
<svg xmlns="http://www.w3.org/2000/svg" width="16" height="16"
fill="currentColor" class="bi bi-moon-stars-fill" viewBox="0 0 16 16">
<path d="M6 .278a.77.77 0 0 1 .08.858 7.2 7.2 0 0 0-.878
3.46c0 4.021 3.278 7.277 7.318 7.277q.792-.001 1.533-.16a.79.79 0 0 1 .81.316.73.73
0 0 1-.031.893A8.35 8.35 0 0 1 8.344 16C3.734 16 0 12.286 0 7.71 0 4.266 2.114
1.312 5.124.06A.75.75 0 0 1 6 .278"/>
<path d="M10.794 3.148a.217.217 0 0 1 .412 0l.387
1.162c.173.518.579.924 1.097 1.097l1.162.387a.217.217 0 0 1 0 .412l-1.162.387a1.73
1.73 0 0 0-1.097 1.097l-.387 1.162a.217.217 0 0 1-.412 0l-.387-1.162A1.73 1.73 0 0
0 9.31 6.593l-1.162-.387a.217.217 0 0 1 0-.412l1.162-.387a1.73 1.73 0 0 0 1.097-
1.097zM13.863.099a.145.145 0 0 1 .274
0l.258.774c.115.346.386.617.732.732l.774.258a.145.145 0 0 1 0 .274l-.774.258a1.16
1.16 0 0 0-.732.732l-.258.774a.145.145 0 0 1-.274 0l-.258-.774a1.16 1.16 0 0
0-.732-.732l-.774-.258a.145.145 0 0 1
0-.274l.774-.258c.346-.115.617-.386.732-.732z"/>
</svg>
</a>
</li>

<li class="nav-item dropdown">


<a class="nav-link dropdown-toggle" href="#"
id="navbarDropdownSearch" role="button" data-bs-toggle="dropdown" aria-
expanded="false">Search</a>
<div class="dropdown-menu dropdown-menu-end p-3 shadow" aria-
labelledby="navbarDropdownSearch" style="width: 340px;">
<form class="d-flex" role="form" method="post" action="/search"
enctype="multipart/form-data">
<label for="freetext_search" class="visually-hidden">Search
term</label>
<div class="input-group w-100">
<input type="text" class="form-control"
id="freetext_search" placeholder="Vulnerability ID or vendor"
name="freetext_search" list="vendors_list" style="min-width: 150px;" autofocus >
<!-- Set size for input -->
<button type="submit" class="btn
btn-primary">Search</button>
</div>
<input type="hidden" name="csrf_token"
value="Ijg5ZDVmZTZkNGQ2YmRhMWRhMmFlN2VkYzI5N2Q2MmM1OGVkNmNiNGUi.Z4uzvQ.ySEsrK_OK_0k
sEh-GjzZH7LzPvo" />
<datalist id="vendors_list"></datalist>
</form>
</div>
</li>

<li class="nav-item dropdown">


<a class="nav-link dropdown-toggle" href="#"
id="navbarDropdownRecent" role="button" data-bs-toggle="dropdown" aria-
expanded="false">
Recent
</a>
<ul class="dropdown-menu" aria-labelledby="navbarDropdownRecent">
<a class="dropdown-item" href="/recent">Vulnerabilities</a>

<a class="dropdown-item" href="/comments/">Comments</a>


<a class="dropdown-item" href="/bundles/">Bundles</a>
<a class="dropdown-item" href="/sightings/">Sightings</a>
</ul>
</li>

<li class="nav-item">
<a class="nav-link" href="/user/login" title="Login">Log in</a>
</li>

</ul>
</div>
</div>
</nav>

<!-- Reusable Modal Structure -->


<div class="modal fade" id="dynamicConfirmModal" tabindex="-1" aria-
labelledby="dynamicConfirmModalLabel" aria-hidden="true">
<div class="modal-dialog">
<div class="modal-content">
<!-- Modal Header -->
<div class="modal-header">
<h5 class="modal-title" id="dynamicConfirmModalLabel"></h5>
<button type="button" class="btn-close" data-bs-dismiss="modal"
aria-label="Close"></button>
</div>

<!-- Modal Body -->


<div class="modal-body" id="dynamicModalMessage">
</div>

<!-- Modal Footer (OK and Cancel buttons) -->


<div class="modal-footer">
<button type="button" class="btn btn-primary" data-bs-
dismiss="modal">Cancel</button>
<button type="button" class="btn btn-success"
id="dynamicConfirmBtn">OK</button>
</div>
</div>
</div>
</div>

<!-- Toast Container -->


<div class="toast-container position-fixed bottom-0 end-0 p-3">
<div id="actionToast" class="toast" role="alert" aria-live="assertive"
aria-atomic="true" data-bs-delay="5000">
<div class="toast-header">
<strong class="me-auto" id="toastTitle">Success</strong>
<button type="button" class="btn-close" data-bs-dismiss="toast" aria-
label="Close"></button>
</div>
<div class="toast-body" id="toastMessage">
</div>
</div>
</div>
</div>
</header>

<main>
<div class="container">

<!-- Modal Template for error messages -->


<div class="modal" id="modalError" tabindex="-1">
<div class="modal-dialog">
<div class="modal-content">
<div class="modal-header">
<h5 class="modal-title">Action not permitted</h5>
</div>
<div class="modal-body">
<p id="modal-error-text">Modal body text goes here.</p>
</div>
<div class="modal-footer">
<button type="button" class="btn btn-primary" data-bs-
dismiss="modal">Close</button>
</div>
</div>
</div>
</div>

<!-- Modal Template for sightings -->


<div class="modal fade" id="sightingModal" tabindex="-1" aria-
labelledby="sightingModalLabel" aria-hidden="true">
<div class="modal-dialog">
<div class="modal-content">
<div class="modal-header">
<h5 class="modal-title" id="sightingModalLabel">Modal Title</h5>
<button type="button" class="btn-close" data-bs-dismiss="modal" aria-
label="Close"></button>
</div>
<div class="modal-body">
<p id="modalMessage">Modal Body</p>
<div class="mb-3">
<label for="sourceInput" class="form-label">Source (Optional)</label>
<input type="text" class="form-control" id="sourceInput"
placeholder="Enter source">
</div>
</div>
<div class="modal-footer">
<button type="button" class="btn btn-secondary" data-bs-
dismiss="modal">Cancel</button>
<button type="button" class="btn btn-primary"
id="sightingModalConfirm">Confirm</button>
</div>
</div>
</div>
</div>

<div class="card">
<div class="card-body">
<h5 class="card-title"><a href="/vuln/CVE-2021-34527">CVE-2021-34527</a></h5>
<h6 class="card-subtitle mb-2 text-body-secondary">
Vulnerability from <a href="https://github.com/CVEProject/cvelistV5"
rel="noreferrer" target="_blank">cvelistv5</a>
</h6>

<div class="row">
<div class="col-md-2 fw-bold">Published</div><div class="col">2021-07-02
21:25</div>
</div>
<div class="row">
<div class="col-md-2 fw-bold">Modified</div><div class="col">2024-08-04
00:12</div>
</div>

<div class="row">
<div class="col-md-2 fw-bold" data-bs-toggle="tooltip" data-bs-
placement="right" title="The Common Vulnerability Scoring System (CVSS) provides a
way to capture the principal characteristics of a vulnerability and produce a
numerical score reflecting its severity.">Severity <span style="color:
green;">?</span></div>
<div class="col">

<span class="bg-danger rounded px-1 text-light">8.8 (High)</span>


- <a href="https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:L/UI:N/
S:U/C:H/I:H/A:H/E:F/RL:O/RC:C" rel="noreferrer"
target="_blank">CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</
a><br />

</div>
</div>

<div class="row" hidden>


<div class="col-md-2 fw-bold" data-bs-toggle="tooltip" data-bs-
placement="left" title="Exploit Prediction Scoring System (EPSS) from FIRST. The
EPSS score is representing the probability of exploitation in the wild in the next
30 days.">EPSS score <span style="color: green;">?</span></div>
<div class="col">
<span id="epss-score"></span>
<span id="epss-percentile" style="text-decoration:underline dotted" data-
bs-toggle="tooltip" data-bs-placement="right" title="The percentile of the current
score, the proportion of all scored vulnerabilities with the same or a lower EPSS
score."></span>
</div>
</div>

<div class="row">

</div>

<div class="row">
<div class="col-md-2 fw-bold">References</div>
<div class="col">

<table class="table table-borderless table-hover">


<thead>
<tr data-bs-toggle="collapse" data-bs-
target="#collapseReferenceTableCVE-2021-34527" aria-expanded="false" aria-
controls="collapseReferenceTableCVE-2021-34527">
<th scope="col" style="width: 20px;"><span class="chevron"
>▼</span></th><th scope="col">URL</th><th scope="col">Tags</th>
</tr>
</thead>
<tbody class="collapse" id="collapseReferenceTableCVE-2021-34527">

<tr><td></td><td><a
href="mailto:secure@microsoft.com">secure@microsoft.com</a></td><td><a
href="http://packetstormsecurity.com/files/167261/Print-Spooler-Remote-DLL-
Injection.html" rel="noreferrer"
target="_blank">http://packetstormsecurity.com/files/167261/Print-Spooler-Remote-
DLL-Injection.html</a></td><td>Exploit, Third Party Advisory, VDB Entry</td></tr>

<tr><td></td><td><a
href="mailto:secure@microsoft.com">secure@microsoft.com</a></td><td><a
href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-
34527" rel="noreferrer"
target="_blank">https://portal.msrc.microsoft.com/en-US/security-guidance/
advisory/CVE-2021-34527</a></td><td>Mitigation, Patch, Vendor Advisory</td></tr>

<tr><td></td><td><a href="mailto:af854a3a-2127-422b-91ae-
364da2661108">af854a3a-2127-422b-91ae-364da2661108</a></td><td><a
href="http://packetstormsecurity.com/files/167261/Print-Spooler-Remote-DLL-
Injection.html" rel="noreferrer"
target="_blank">http://packetstormsecurity.com/files/167261/Print-Spooler-Remote-
DLL-Injection.html</a></td><td>Exploit, Third Party Advisory, VDB Entry</td></tr>

<tr><td></td><td><a href="mailto:af854a3a-2127-422b-91ae-
364da2661108">af854a3a-2127-422b-91ae-364da2661108</a></td><td><a
href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-
34527" rel="noreferrer"
target="_blank">https://portal.msrc.microsoft.com/en-US/security-guidance/
advisory/CVE-2021-34527</a></td><td>Mitigation, Patch, Vendor Advisory</td></tr>

</tbody>
</table>
</div>
</div>

<div class="row">
<div class="col-md-2 fw-bold">Impacted products</div>
<div class="col">
<table class="table table-borderless table-hover">
<thead>
<tr>
<th scope="col" style="width: 20px;"></th>
<th scope="col">Vendor</th>
<th scope="col">Product</th>
<th scope="col">Version</th>
</tr>
</thead>
<tbody>

<!-- First Row with Toggle for the First Element -->

<tr data-bs-toggle="collapse" data-bs-


target="#collapseProductTableCVE-2021-34527" aria-expanded="false" aria-
controls="collapseProductTableCVE-2021-34527">
<td><span class="chevron">▼</span></td>
<td><a href="/search?vendor=Microsoft">Microsoft</a></td>
<td><a href="/search?
vendor=Microsoft&amp;product=Windows+10+Version+1809">Windows 10 Version
1809</a></td>
<td>

<b>Version:</b> 10.0.0 &nbsp;&nbsp;<b>&lt;</b>


10.0.17763.2029<br />

&nbsp;&nbsp;&nbsp;&nbsp;cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.2029:*:*:*:*
:*:x86:*<br />

&nbsp;&nbsp;&nbsp;&nbsp;cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.2029:*:*:*:*
:*:x64:*<br />

&nbsp;&nbsp;&nbsp;&nbsp;cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.2029:*:*:*:*
:*:arm64:*<br />

</td>
</tr>

<!-- Remaining Rows in the Loop -->


<tr class="collapse" id="collapseProductTableCVE-2021-34527">
<td colspan="4">
<table class="table table-borderless">
<tbody>

<tr>
<td></td>
<td><a href="/search?vendor=Microsoft">Microsoft</a></td>
<td><a href="/search?
vendor=Microsoft&amp;product=Windows+Server+2019">Windows Server 2019</a></td>
<td>

<b>Version:</b> 10.0.0 &nbsp;&nbsp;<b>&lt;</b>


10.0.17763.2029<br />

&nbsp;&nbsp;&nbsp;&nbsp;cpe:2.3:o:microsoft:windows_server_2019:10.0.17763.2029:*:*
:*:*:*:*:*<br />

</td>
</tr>

<tr>
<td></td>
<td><a href="/search?vendor=Microsoft">Microsoft</a></td>
<td><a href="/search?
vendor=Microsoft&amp;product=Windows+Server+2019+
(Server+Core+installation)">Windows Server 2019 (Server Core installation)</a></td>
<td>

<b>Version:</b> 10.0.0 &nbsp;&nbsp;<b>&lt;</b>


10.0.17763.2029<br />

&nbsp;&nbsp;&nbsp;&nbsp;cpe:2.3:o:microsoft:windows_server_2019:10.0.17763.2029:*:*
:*:*:*:*:*<br />

</td>
</tr>

<tr>
<td></td>
<td><a href="/search?vendor=Microsoft">Microsoft</a></td>
<td><a href="/search?
vendor=Microsoft&amp;product=Windows+Server+2022">Windows Server 2022</a></td>
<td>

<b>Version:</b> 10.0.0 &nbsp;&nbsp;<b>&lt;</b>


10.0.20348.230<br />

&nbsp;&nbsp;&nbsp;&nbsp;cpe:2.3:o:microsoft:windows_server_2022:10.0.20348.230:*:*:
*:*:*:*:*<br />
</td>
</tr>

<tr>
<td></td>
<td><a href="/search?vendor=Microsoft">Microsoft</a></td>
<td><a href="/search?
vendor=Microsoft&amp;product=Windows+10+Version+20H2">Windows 10 Version
20H2</a></td>
<td>

<b>Version:</b> 10.0.0 &nbsp;&nbsp;<b>&lt;</b>


10.0.19042.1083<br />

&nbsp;&nbsp;&nbsp;&nbsp;cpe:2.3:o:microsoft:windows_10_20H2:10.0.19042.1083:*:*:*:*
:*:x86:*<br />

&nbsp;&nbsp;&nbsp;&nbsp;cpe:2.3:o:microsoft:windows_10_20H2:10.0.19042.1083:*:*:*:*
:*:arm64:*<br />

</td>
</tr>

<tr>
<td></td>
<td><a href="/search?vendor=Microsoft">Microsoft</a></td>
<td><a href="/search?
vendor=Microsoft&amp;product=Windows+Server+version+20H2">Windows Server version
20H2</a></td>
<td>

<b>Version:</b> 10.0.0 &nbsp;&nbsp;<b>&lt;</b>


10.0.19042.1083<br />

&nbsp;&nbsp;&nbsp;&nbsp;cpe:2.3:o:microsoft:windows_server_20H2:10.0.19042.1083:*:*
:*:*:*:*:*<br />

</td>
</tr>

<tr>
<td></td>
<td><a href="/search?vendor=Microsoft">Microsoft</a></td>
<td><a href="/search?
vendor=Microsoft&amp;product=Windows+11+version+21H2">Windows 11 version
21H2</a></td>
<td>

<b>Version:</b> 10.0.0 &nbsp;&nbsp;<b>&lt;</b>


10.0.22000.318<br />

&nbsp;&nbsp;&nbsp;&nbsp;cpe:2.3:o:microsoft:windows_11_21H2:10.0.22000.318:*:*:*:*:
*:x64:*<br />

&nbsp;&nbsp;&nbsp;&nbsp;cpe:2.3:o:microsoft:windows_11_21H2:10.0.22000.318:*:*:*:*:
*:arm64:*<br />

</td>
</tr>

<tr>
<td></td>
<td><a href="/search?vendor=Microsoft">Microsoft</a></td>
<td><a href="/search?
vendor=Microsoft&amp;product=Windows+10+Version+21H2">Windows 10 Version
21H2</a></td>
<td>

<b>Version:</b> 10.0.0 &nbsp;&nbsp;<b>&lt;</b>


10.0.19044.1415<br />

&nbsp;&nbsp;&nbsp;&nbsp;cpe:2.3:o:microsoft:windows_10_21H2:10.0.19044.1415:*:*:*:*
:*:x86:*<br />

&nbsp;&nbsp;&nbsp;&nbsp;cpe:2.3:o:microsoft:windows_10_21H2:10.0.19044.1415:*:*:*:*
:*:arm64:*<br />

&nbsp;&nbsp;&nbsp;&nbsp;cpe:2.3:o:microsoft:windows_10_21H2:10.0.19044.1415:*:*:*:*
:*:x64:*<br />

</td>
</tr>

<tr>
<td></td>
<td><a href="/search?vendor=Microsoft">Microsoft</a></td>
<td><a href="/search?
vendor=Microsoft&amp;product=Windows+11+version+22H2">Windows 11 version
22H2</a></td>
<td>
<b>Version:</b> 10.0.0 &nbsp;&nbsp;<b>&lt;</b>
10.0.22621.674<br />

&nbsp;&nbsp;&nbsp;&nbsp;cpe:2.3:o:microsoft:windows_11_22H2:10.0.22621.674:*:*:*:*:
*:arm64:*<br />

&nbsp;&nbsp;&nbsp;&nbsp;cpe:2.3:o:microsoft:windows_11_22H2:10.0.22621.674:*:*:*:*:
*:x64:*<br />

</td>
</tr>

<tr>
<td></td>
<td><a href="/search?vendor=Microsoft">Microsoft</a></td>
<td><a href="/search?
vendor=Microsoft&amp;product=Windows+10+Version+22H2">Windows 10 Version
22H2</a></td>
<td>

<b>Version:</b> 10.0.0 &nbsp;&nbsp;<b>&lt;</b>


10.0.19045.2251<br />

&nbsp;&nbsp;&nbsp;&nbsp;cpe:2.3:o:microsoft:windows_10_22H2:10.0.19045.2251:*:*:*:*
:*:x64:*<br />

&nbsp;&nbsp;&nbsp;&nbsp;cpe:2.3:o:microsoft:windows_10_22H2:10.0.19045.2251:*:*:*:*
:*:arm64:*<br />

&nbsp;&nbsp;&nbsp;&nbsp;cpe:2.3:o:microsoft:windows_10_22H2:10.0.19045.2251:*:*:*:*
:*:x86:*<br />

</td>
</tr>

<tr>
<td></td>
<td><a href="/search?vendor=Microsoft">Microsoft</a></td>
<td><a href="/search?
vendor=Microsoft&amp;product=Windows+10+Version+1507">Windows 10 Version
1507</a></td>
<td>
<b>Version:</b> 10.0.0 &nbsp;&nbsp;<b>&lt;</b>
10.0.10240.18969<br />

&nbsp;&nbsp;&nbsp;&nbsp;cpe:2.3:o:microsoft:windows_10_1507:10.0.10240.18969:*:*:*:
*:*:x86:*<br />

&nbsp;&nbsp;&nbsp;&nbsp;cpe:2.3:o:microsoft:windows_10_1507:10.0.10240.18969:*:*:*:
*:*:x64:*<br />

</td>
</tr>

<tr>
<td></td>
<td><a href="/search?vendor=Microsoft">Microsoft</a></td>
<td><a href="/search?
vendor=Microsoft&amp;product=Windows+10+Version+1607">Windows 10 Version
1607</a></td>
<td>

<b>Version:</b> 10.0.0 &nbsp;&nbsp;<b>&lt;</b>


10.0.14393.4470<br />

&nbsp;&nbsp;&nbsp;&nbsp;cpe:2.3:o:microsoft:windows_10_1607:10.0.14393.4470:*:*:*:*
:*:x86:*<br />

&nbsp;&nbsp;&nbsp;&nbsp;cpe:2.3:o:microsoft:windows_10_1607:10.0.14393.4470:*:*:*:*
:*:x64:*<br />

</td>
</tr>

<tr>
<td></td>
<td><a href="/search?vendor=Microsoft">Microsoft</a></td>
<td><a href="/search?
vendor=Microsoft&amp;product=Windows+Server+2016">Windows Server 2016</a></td>
<td>

<b>Version:</b> 10.0.0 &nbsp;&nbsp;<b>&lt;</b>


10.0.14393.4470<br />
&nbsp;&nbsp;&nbsp;&nbsp;cpe:2.3:o:microsoft:windows_server_2016:10.0.14393.4470:*:*
:*:*:*:*:*<br />

</td>
</tr>

<tr>
<td></td>
<td><a href="/search?vendor=Microsoft">Microsoft</a></td>
<td><a href="/search?
vendor=Microsoft&amp;product=Windows+Server+2016+
(Server+Core+installation)">Windows Server 2016 (Server Core installation)</a></td>
<td>

<b>Version:</b> 10.0.0 &nbsp;&nbsp;<b>&lt;</b>


10.0.14393.4470<br />

&nbsp;&nbsp;&nbsp;&nbsp;cpe:2.3:o:microsoft:windows_server_2016:10.0.14393.4470:*:*
:*:*:*:*:*<br />

</td>
</tr>

<tr>
<td></td>
<td><a href="/search?vendor=Microsoft">Microsoft</a></td>
<td><a href="/search?
vendor=Microsoft&amp;product=Windows+8.1">Windows 8.1</a></td>
<td>

<b>Version:</b> 6.3.0 &nbsp;&nbsp;<b>&lt;</b>


6.3.9600.20046<br />

&nbsp;&nbsp;&nbsp;&nbsp;cpe:2.3:o:microsoft:windows_rt_8.1:6.3.9600.20046:*:*:*:*:*
:*:*<br />

</td>
</tr>

<tr>
<td></td>
<td><a href="/search?vendor=Microsoft">Microsoft</a></td>
<td><a href="/search?
vendor=Microsoft&amp;product=Windows+Server+2008+Service+Pack+2">Windows Server
2008 Service Pack 2</a></td>
<td>

<b>Version:</b> 6.0.0 &nbsp;&nbsp;<b>&lt;</b>


6.0.6003.21138<br />

&nbsp;&nbsp;&nbsp;&nbsp;cpe:2.3:o:microsoft:windows_server_2008_sp2:6.0.6003.21138:
*:*:*:*:*:x64:*<br />

</td>
</tr>

<tr>
<td></td>
<td><a href="/search?vendor=Microsoft">Microsoft</a></td>
<td><a href="/search?
vendor=Microsoft&amp;product=Windows+Server+2008+Service+Pack+2+
(Server+Core+installation)">Windows Server 2008 Service Pack 2 (Server Core
installation)</a></td>
<td>

<b>Version:</b> 6.0.0 &nbsp;&nbsp;<b>&lt;</b>


6.0.6003.21138<br />

&nbsp;&nbsp;&nbsp;&nbsp;cpe:2.3:o:microsoft:windows_server_2008_sp2:6.0.6003.21138:
*:*:*:*:*:x64:*<br />

&nbsp;&nbsp;&nbsp;&nbsp;cpe:2.3:o:microsoft:windows_server_2008_sp2:6.0.6003.21138:
*:*:*:*:*:x86:*<br />

</td>
</tr>

<tr>
<td></td>
<td><a href="/search?vendor=Microsoft">Microsoft</a></td>
<td><a href="/search?
vendor=Microsoft&amp;product=Windows+Server+2008++Service+Pack+2">Windows Server
2008 Service Pack 2</a></td>
<td>

<b>Version:</b> 6.0.0 &nbsp;&nbsp;<b>&lt;</b>


6.0.6003.21138<br />
&nbsp;&nbsp;&nbsp;&nbsp;cpe:2.3:o:microsoft:windows_server_2008_sp2:6.0.6003.21138:
*:*:*:*:*:x86:*<br />

</td>
</tr>

<tr>
<td></td>
<td><a href="/search?vendor=Microsoft">Microsoft</a></td>
<td><a href="/search?
vendor=Microsoft&amp;product=Windows+Server+2008+R2+Service+Pack+1">Windows Server
2008 R2 Service Pack 1</a></td>
<td>

<b>Version:</b> 6.1.0 &nbsp;&nbsp;<b>&lt;</b>


6.1.7601.25633<br />

&nbsp;&nbsp;&nbsp;&nbsp;cpe:2.3:o:microsoft:windows_server_2008_R2:6.1.7601.25633:*
:*:*:*:*:x64:*<br />

</td>
</tr>

<tr>
<td></td>
<td><a href="/search?vendor=Microsoft">Microsoft</a></td>
<td><a href="/search?
vendor=Microsoft&amp;product=Windows+Server+2008+R2+Service+Pack+1+
(Server+Core+installation)">Windows Server 2008 R2 Service Pack 1 (Server Core
installation)</a></td>
<td>

<b>Version:</b> 6.0.0 &nbsp;&nbsp;<b>&lt;</b>


6.1.7601.25633<br />

&nbsp;&nbsp;&nbsp;&nbsp;cpe:2.3:o:microsoft:windows_server_2008_R2:6.1.7601.25633:*
:*:*:*:*:x64:*<br />

</td>
</tr>

<tr>
<td></td>
<td><a href="/search?vendor=Microsoft">Microsoft</a></td>
<td><a href="/search?
vendor=Microsoft&amp;product=Windows+Server+2012">Windows Server 2012</a></td>
<td>

<b>Version:</b> 6.2.0 &nbsp;&nbsp;<b>&lt;</b>


6.2.9200.23383<br />

&nbsp;&nbsp;&nbsp;&nbsp;cpe:2.3:o:microsoft:windows_server_2012:6.2.9200.23383:*:*:
*:*:*:x64:*<br />

</td>
</tr>

<tr>
<td></td>
<td><a href="/search?vendor=Microsoft">Microsoft</a></td>
<td><a href="/search?
vendor=Microsoft&amp;product=Windows+Server+2012+
(Server+Core+installation)">Windows Server 2012 (Server Core installation)</a></td>
<td>

<b>Version:</b> 6.2.0 &nbsp;&nbsp;<b>&lt;</b>


6.2.9200.23383<br />

&nbsp;&nbsp;&nbsp;&nbsp;cpe:2.3:o:microsoft:windows_server_2012:6.2.9200.23383:*:*:
*:*:*:x64:*<br />

</td>
</tr>

<tr>
<td></td>
<td><a href="/search?vendor=Microsoft">Microsoft</a></td>
<td><a href="/search?
vendor=Microsoft&amp;product=Windows+Server+2012+R2">Windows Server 2012
R2</a></td>
<td>

<b>Version:</b> 6.3.0 &nbsp;&nbsp;<b>&lt;</b>


6.3.9600.20046<br />
&nbsp;&nbsp;&nbsp;&nbsp;cpe:2.3:o:microsoft:windows_server_2012_R2:6.3.9600.20046:*
:*:*:*:*:x64:*<br />

</td>
</tr>

<tr>
<td></td>
<td><a href="/search?vendor=Microsoft">Microsoft</a></td>
<td><a href="/search?
vendor=Microsoft&amp;product=Windows+Server+2012+R2+
(Server+Core+installation)">Windows Server 2012 R2 (Server Core
installation)</a></td>
<td>

<b>Version:</b> 6.3.0 &nbsp;&nbsp;<b>&lt;</b>


6.3.9600.20046<br />

&nbsp;&nbsp;&nbsp;&nbsp;cpe:2.3:o:microsoft:windows_server_2012_R2:6.3.9600.20046:*
:*:*:*:*:x64:*<br />

</td>
</tr>

</tbody>
</table>
</td>
</tr>

</tbody>
</table>

</div>
</div>

<div class="card">
<div class="card-body">
<h5 class="card-title">CISA Known exploited vulnerability</h5>
<h6 class="card-subtitle mb-2 text-body-secondary">
Data from the <a href="https://www.cisa.gov/known-exploited-vulnerabilities-
catalog" rel="noreferrer" target="_blank">Known Exploited Vulnerabilities
Catalog</a>
</h6>
<p class="card-text">Date added: 2021-11-03</p>
<p class="card-text">Due date: 2021-07-20</p>
<p class="card-text">Required action: Apply updates per vendor
instructions.</p>
<p class="card-text">Used in ransomware: Known</p>

<p class="card-text">Notes: Reference CISA&#39;s ED 21-04


(https://www.cisa.gov/news-events/directives/ed-21-04-mitigate-windows-print-
spooler-service-vulnerability) for further guidance and requirements. Note: The due
date for addressing this vulnerability aligns with the requirements outlined in ED
21-04. https://nvd.nist.gov/vuln/detail/CVE-2021-34527</p>

</div>
</div>

<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-34527" class="card-link"


rel="noreferrer" target="_blank">Show details on NVD website</a>

<br /><br />


<div class="btn-group" role="group">
<a role="button" class="btn btn-primary" data-bs-toggle="collapse" data-bs-
target="#collapseJsonCVE-2021-34527" aria-expanded="false" aria-
controls="collapseJsonCVE-2021-34527">
JSON

<svg class="bi"
width="1em" height="1em" fill="currentColor">

<use xlink:href="/bootstrap/static/icons/bootstrap-icons.svg#chevron-down"/>
</svg>

</a>
<div class="btn-group" role="group">
<button id="btnGroupDropShare" type="button" class="btn btn-primary" data-bs-
toggle="dropdown" aria-expanded="false">
Share

<svg class="bi"
width="1em" height="1em" fill="currentColor">

<use xlink:href="/bootstrap/static/icons/bootstrap-icons.svg#chevron-down"/>
</svg>

</button>
<ul class="dropdown-menu" aria-labelledby="btnGroupDropShare">
<li><a class="dropdown-item" href="https://news.ycombinator.com/submitlink?
u=https://cve.circl.lu/vuln/CVE-2021-34527&t=Vulnerability CVE-2021-34527"
target="_blank" title="Share on Hacker News">Hacker News</a></li>
<li><a class="dropdown-item" href="https://www.linkedin.com/shareArticle?
mini=true&url=https://cve.circl.lu/vuln/CVE-2021-34527&title=Vulnerability CVE-
2021-34527" target="_blank" title="Share on LinkedIn">LinkedIn</a></li>
<li><a class="dropdown-item" href="https://mastodonshare.com/?
text=Vulnerability CVE-2021-34527&url=https://cve.circl.lu/vuln/CVE-2021-34527"
target="_blank" title="Share on Mastodon">Mastodon</a></li>
<li><a class="dropdown-item"
href="https://www.newspipe.org/bookmark/bookmarklet?href=https://cve.circl.lu/
vuln/CVE-2021-34527&title=Vulnerability CVE-2021-34527" target="_blank"
title="Share on Newspipe">Newspipe</a></li>
<li><a class="dropdown-item" href="https://api.pinboard.in/v1/posts/add?
url=https://cve.circl.lu/vuln/CVE-2021-34527&description=Vulnerability CVE-2021-
34527" target="_blank" title="Share on Pinboard">Pinboard</a></li>
<li><a class="dropdown-item"
href="https://reddit.com/submit?link=https://cve.circl.lu/vuln/CVE-2021-
34527&title=Vulnerability CVE-2021-34527" target="_blank" title="Share on
Reddit">Reddit</a></li>
</ul>
</div>

<a type="button" class="btn btn-primary" title="Copy to clipboard" aria-


label="Copy to clipboard" onclick="copyToClipboard('CVE-2021-34527')" vuln-id="CVE-
2021-34527" href="#">To clipboard</a>

</div>

<div class="collapse" id="collapseJsonCVE-2021-34527">


<br />
<div class="card card-body">
<pre class="json-container" id="containerCVE-2021-34527">{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2021-34527",
"options": [
{
"Exploitation": "active"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-01-24T16:04:14.042095Z",
"version": "2.0.3"
},
"type": "ssvc"
}
},
{
"other": {
"content": {
"dateAdded": "2021-11-03",
"reference": "https://www.cisa.gov/known-exploited-vulnerabilities-
catalog?search_api_fulltext=CVE-2021-34527"
},
"type": "kev"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-06-10T18:29:28.155Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
},
{
"providerMetadata": {
"dateUpdated": "2024-08-04T00:12:50.390Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url":
"https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-34527"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://packetstormsecurity.com/files/167261/Print-Spooler-
Remote-DLL-Injection.html"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"cpes": [
"cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.2029:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.2029:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.2029:*:*:*:*:*:arm64:*"
],
"platforms": [
"32-bit Systems",
"x64-based Systems",
"ARM64-based Systems"
],
"product": "Windows 10 Version 1809",
"vendor": "Microsoft",
"versions": [
{
"lessThan": "10.0.17763.2029",
"status": "affected",
"version": "10.0.0",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:o:microsoft:windows_server_2019:10.0.17763.2029:*:*:*:*:*:*:*"
],
"platforms": [
"x64-based Systems"
],
"product": "Windows Server 2019",
"vendor": "Microsoft",
"versions": [
{
"lessThan": "10.0.17763.2029",
"status": "affected",
"version": "10.0.0",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:o:microsoft:windows_server_2019:10.0.17763.2029:*:*:*:*:*:*:*"
],
"platforms": [
"x64-based Systems"
],
"product": "Windows Server 2019 (Server Core installation)",
"vendor": "Microsoft",
"versions": [
{
"lessThan": "10.0.17763.2029",
"status": "affected",
"version": "10.0.0",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:o:microsoft:windows_server_2022:10.0.20348.230:*:*:*:*:*:*:*"
],
"platforms": [
"x64-based Systems"
],
"product": "Windows Server 2022",
"vendor": "Microsoft",
"versions": [
{
"lessThan": "10.0.20348.230",
"status": "affected",
"version": "10.0.0",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:o:microsoft:windows_10_20H2:10.0.19042.1083:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_20H2:10.0.19042.1083:*:*:*:*:*:arm64:*"
],
"platforms": [
"32-bit Systems",
"ARM64-based Systems"
],
"product": "Windows 10 Version 20H2",
"vendor": "Microsoft",
"versions": [
{
"lessThan": "10.0.19042.1083",
"status": "affected",
"version": "10.0.0",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:o:microsoft:windows_server_20H2:10.0.19042.1083:*:*:*:*:*:*:*"
],
"platforms": [
"x64-based Systems"
],
"product": "Windows Server version 20H2",
"vendor": "Microsoft",
"versions": [
{
"lessThan": "10.0.19042.1083",
"status": "affected",
"version": "10.0.0",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:o:microsoft:windows_11_21H2:10.0.22000.318:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_11_21H2:10.0.22000.318:*:*:*:*:*:arm64:*"
],
"platforms": [
"x64-based Systems",
"ARM64-based Systems"
],
"product": "Windows 11 version 21H2",
"vendor": "Microsoft",
"versions": [
{
"lessThan": "10.0.22000.318",
"status": "affected",
"version": "10.0.0",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:o:microsoft:windows_10_21H2:10.0.19044.1415:*:*:*:*:*:x86:*",

"cpe:2.3:o:microsoft:windows_10_21H2:10.0.19044.1415:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_10_21H2:10.0.19044.1415:*:*:*:*:*:x64:*"
],
"platforms": [
"32-bit Systems",
"ARM64-based Systems"
],
"product": "Windows 10 Version 21H2",
"vendor": "Microsoft",
"versions": [
{
"lessThan": "10.0.19044.1415",
"status": "affected",
"version": "10.0.0",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:o:microsoft:windows_11_22H2:10.0.22621.674:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_11_22H2:10.0.22621.674:*:*:*:*:*:x64:*"
],
"platforms": [
"ARM64-based Systems",
"x64-based Systems"
],
"product": "Windows 11 version 22H2",
"vendor": "Microsoft",
"versions": [
{
"lessThan": "10.0.22621.674",
"status": "affected",
"version": "10.0.0",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:o:microsoft:windows_10_22H2:10.0.19045.2251:*:*:*:*:*:x64:*",

"cpe:2.3:o:microsoft:windows_10_22H2:10.0.19045.2251:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_10_22H2:10.0.19045.2251:*:*:*:*:*:x86:*"
],
"platforms": [
"x64-based Systems",
"ARM64-based Systems",
"32-bit Systems"
],
"product": "Windows 10 Version 22H2",
"vendor": "Microsoft",
"versions": [
{
"lessThan": "10.0.19045.2251",
"status": "affected",
"version": "10.0.0",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:o:microsoft:windows_10_1507:10.0.10240.18969:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1507:10.0.10240.18969:*:*:*:*:*:x64:*"
],
"platforms": [
"32-bit Systems",
"x64-based Systems"
],
"product": "Windows 10 Version 1507",
"vendor": "Microsoft",
"versions": [
{
"lessThan": "10.0.10240.18969",
"status": "affected",
"version": "10.0.0",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:o:microsoft:windows_10_1607:10.0.14393.4470:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1607:10.0.14393.4470:*:*:*:*:*:x64:*"
],
"platforms": [
"32-bit Systems",
"x64-based Systems"
],
"product": "Windows 10 Version 1607",
"vendor": "Microsoft",
"versions": [
{
"lessThan": "10.0.14393.4470",
"status": "affected",
"version": "10.0.0",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:o:microsoft:windows_server_2016:10.0.14393.4470:*:*:*:*:*:*:*"
],
"platforms": [
"x64-based Systems"
],
"product": "Windows Server 2016",
"vendor": "Microsoft",
"versions": [
{
"lessThan": "10.0.14393.4470",
"status": "affected",
"version": "10.0.0",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:o:microsoft:windows_server_2016:10.0.14393.4470:*:*:*:*:*:*:*"
],
"platforms": [
"x64-based Systems"
],
"product": "Windows Server 2016 (Server Core installation)",
"vendor": "Microsoft",
"versions": [
{
"lessThan": "10.0.14393.4470",
"status": "affected",
"version": "10.0.0",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:o:microsoft:windows_rt_8.1:6.3.9600.20046:*:*:*:*:*:*:*"
],
"platforms": [
"ARM64-based Systems"
],
"product": "Windows 8.1",
"vendor": "Microsoft",
"versions": [
{
"lessThan": "6.3.9600.20046",
"status": "affected",
"version": "6.3.0",
"versionType": "custom"
}
]
},
{
"cpes": [

"cpe:2.3:o:microsoft:windows_server_2008_sp2:6.0.6003.21138:*:*:*:*:*:x64:*"
],
"platforms": [
"32-bit Systems"
],
"product": "Windows Server 2008 Service Pack 2",
"vendor": "Microsoft",
"versions": [
{
"lessThan": "6.0.6003.21138",
"status": "affected",
"version": "6.0.0",
"versionType": "custom"
}
]
},
{
"cpes": [

"cpe:2.3:o:microsoft:windows_server_2008_sp2:6.0.6003.21138:*:*:*:*:*:x64:*",

"cpe:2.3:o:microsoft:windows_server_2008_sp2:6.0.6003.21138:*:*:*:*:*:x86:*"
],
"platforms": [
"32-bit Systems",
"x64-based Systems"
],
"product": "Windows Server 2008 Service Pack 2 (Server Core
installation)",
"vendor": "Microsoft",
"versions": [
{
"lessThan": "6.0.6003.21138",
"status": "affected",
"version": "6.0.0",
"versionType": "custom"
}
]
},
{
"cpes": [

"cpe:2.3:o:microsoft:windows_server_2008_sp2:6.0.6003.21138:*:*:*:*:*:x86:*"
],
"platforms": [
"x64-based Systems"
],
"product": "Windows Server 2008 Service Pack 2",
"vendor": "Microsoft",
"versions": [
{
"lessThan": "6.0.6003.21138",
"status": "affected",
"version": "6.0.0",
"versionType": "custom"
}
]
},
{
"cpes": [

"cpe:2.3:o:microsoft:windows_server_2008_R2:6.1.7601.25633:*:*:*:*:*:x64:*"
],
"platforms": [
"x64-based Systems"
],
"product": "Windows Server 2008 R2 Service Pack 1",
"vendor": "Microsoft",
"versions": [
{
"lessThan": "6.1.7601.25633",
"status": "affected",
"version": "6.1.0",
"versionType": "custom"
}
]
},
{
"cpes": [

"cpe:2.3:o:microsoft:windows_server_2008_R2:6.1.7601.25633:*:*:*:*:*:x64:*"
],
"platforms": [
"x64-based Systems"
],
"product": "Windows Server 2008 R2 Service Pack 1 (Server Core
installation)",
"vendor": "Microsoft",
"versions": [
{
"lessThan": "6.1.7601.25633",
"status": "affected",
"version": "6.0.0",
"versionType": "custom"
}
]
},
{
"cpes": [

"cpe:2.3:o:microsoft:windows_server_2012:6.2.9200.23383:*:*:*:*:*:x64:*"
],
"platforms": [
"x64-based Systems"
],
"product": "Windows Server 2012",
"vendor": "Microsoft",
"versions": [
{
"lessThan": "6.2.9200.23383",
"status": "affected",
"version": "6.2.0",
"versionType": "custom"
}
]
},
{
"cpes": [

"cpe:2.3:o:microsoft:windows_server_2012:6.2.9200.23383:*:*:*:*:*:x64:*"
],
"platforms": [
"x64-based Systems"
],
"product": "Windows Server 2012 (Server Core installation)",
"vendor": "Microsoft",
"versions": [
{
"lessThan": "6.2.9200.23383",
"status": "affected",
"version": "6.2.0",
"versionType": "custom"
}
]
},
{
"cpes": [

"cpe:2.3:o:microsoft:windows_server_2012_R2:6.3.9600.20046:*:*:*:*:*:x64:*"
],
"platforms": [
"x64-based Systems"
],
"product": "Windows Server 2012 R2",
"vendor": "Microsoft",
"versions": [
{
"lessThan": "6.3.9600.20046",
"status": "affected",
"version": "6.3.0",
"versionType": "custom"
}
]
},
{
"cpes": [

"cpe:2.3:o:microsoft:windows_server_2012_R2:6.3.9600.20046:*:*:*:*:*:x64:*"
],
"platforms": [
"x64-based Systems"
],
"product": "Windows Server 2012 R2 (Server Core installation)",
"vendor": "Microsoft",
"versions": [
{
"lessThan": "6.3.9600.20046",
"status": "affected",
"version": "6.3.0",
"versionType": "custom"
}
]
}
],
"datePublic": "2021-07-01T07:00:00+00:00",
"descriptions": [
{
"lang": "en-US",
"value": "\u003cp\u003eA remote code execution vulnerability exists when
the Windows Print Spooler service improperly performs privileged file operations.
An attacker who successfully exploited this vulnerability could run arbitrary code
with SYSTEM privileges. An attacker could then install programs; view, change, or
delete data; or create new accounts with full user rights.\u003c/p\u003e\n\u003cp\
u003eUPDATE July 7, 2021: The security update for Windows Server 2012, Windows
Server 2016 and Windows 10, Version 1607 have been released. Please see the
Security Updates table for the applicable update for your system. We recommend that
you install these updates immediately. If you are unable to install these updates,
see the FAQ and Workaround sections in this CVE for information on how to help
protect your system from this vulnerability.\u003c/p\u003e\n\u003cp\u003eIn
addition to installing the updates, in order to secure your system, you must
confirm that the following registry settings are set to 0 (zero) or are not defined
(\u003cstrong\u003eNote\u003c/strong\u003e: These registry keys do not exist by
default, and therefore are already at the secure setting.), also that your Group
Policy setting are correct (see FAQ):\u003c/p\u003e\n\u003cul\u003e\n\u003cli\
u003eHKEY_LOCAL_MACHINE\\SOFTWARE\\Policies\\Microsoft\\Windows NT\\Printers\\
PointAndPrint\u003c/li\u003e\n\u003cli\u003eNoWarningNoElevationOnInstall = 0
(DWORD) or not defined (default setting)\u003c/li\u003e\n\u003cli\
u003eUpdatePromptSettings = 0 (DWORD) or not defined (default setting)\u003c/li\
u003e\n\u003c/ul\u003e\n\u003cp\u003e\u003cstrong\u003eHaving
NoWarningNoElevationOnInstall set to 1 makes your system vulnerable by design.\
u003c/strong\u003e\u003c/p\u003e\n\u003cp\u003eUPDATE July 6, 2021: Microsoft has
completed the investigation and has released security updates to address this
vulnerability. Please see the Security Updates table for the applicable update for
your system. We recommend that you install these updates immediately. If you are
unable to install these updates, see the FAQ and Workaround sections in this CVE
for information on how to help protect your system from this vulnerability. See
also \u003ca href=\"https://support.microsoft.com/topic/31b91c02-05bc-4ada-a7ea-
183b129578a7\"\u003eKB5005010: Restricting installation of new printer drivers
after applying the July 6, 2021 updates\u003c/a\u003e.\u003c/p\u003e\n\u003cp\
u003eNote that the security updates released on and after July 6, 2021 contain
protections for CVE-2021-1675 and the additional remote code execution exploit in
the Windows Print Spooler service known as \u201cPrintNightmare\u201d, documented
in CVE-2021-34527.\u003c/p\u003e\n"
}
],
"metrics": [
{
"cvssV3_1": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString":
"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en-US",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "Remote Code Execution",
"lang": "en-US",
"type": "Impact"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2023-12-28T22:37:17.773Z",
"orgId": "f38d906d-7342-40ea-92c1-6c4a2c6478c8",
"shortName": "microsoft"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url":
"https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-34527"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://packetstormsecurity.com/files/167261/Print-Spooler-Remote-
DLL-Injection.html"
}
],
"title": "Windows Print Spooler Remote Code Execution Vulnerability"
}
},
"cveMetadata": {
"assignerOrgId": "f38d906d-7342-40ea-92c1-6c4a2c6478c8",
"assignerShortName": "microsoft",
"cveId": "CVE-2021-34527",
"datePublished": "2021-07-02T21:25:11",
"dateReserved": "2021-06-09T00:00:00",
"dateUpdated": "2024-08-04T00:12:50.390Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"cisa_known_exploited": {
"cveID": "CVE-2021-34527",
"cwes": "[\"CWE-269\"]",
"dateAdded": "2021-11-03",
"dueDate": "2021-07-20",
"knownRansomwareCampaignUse": "Known",
"notes": "Reference CISA\u0027s ED 21-04
(https://www.cisa.gov/news-events/directives/ed-21-04-mitigate-windows-print-
spooler-service-vulnerability) for further guidance and requirements. Note: The due
date for addressing this vulnerability aligns with the requirements outlined in ED
21-04. https://nvd.nist.gov/vuln/detail/CVE-2021-34527",
"product": "Windows",
"requiredAction": "Apply updates per vendor instructions.",
"shortDescription": "Microsoft Windows Print Spooler contains an unspecified
vulnerability due to the Windows Print Spooler service improperly performing
privileged file operations. Successful exploitation allows an attacker to perform
remote code execution with SYSTEM privileges. The vulnerability is also known under
the moniker of PrintNightmare.",
"vendorProject": "Microsoft",
"vulnerabilityName": "Microsoft Windows Print Spooler Remote Code Execution
Vulnerability"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2021-
34527\",\"sourceIdentifier\":\"secure@microsoft.com\",\"published\":\"2021-07-
02T22:15:08.757\",\"lastModified\":\"2024-11-
21T06:10:36.397\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":
[{\"lang\":\"en\",\"value\":\"\u003cp\u003eA remote code execution vulnerability
exists when the Windows Print Spooler service improperly performs privileged file
operations. An attacker who successfully exploited this vulnerability could run
arbitrary code with SYSTEM privileges. An attacker could then install programs;
view, change, or delete data; or create new accounts with full user
rights.\u003c/p\u003e\\n\u003cp\u003eUPDATE July 7, 2021: The security update for
Windows Server 2012, Windows Server 2016 and Windows 10, Version 1607 have been
released. Please see the Security Updates table for the applicable update for your
system. We recommend that you install these updates immediately. If you are unable
to install these updates, see the FAQ and Workaround sections in this CVE for
information on how to help protect your system from this vulnerability.\u003c/p\
u003e\\n\u003cp\u003eIn addition to installing the updates, in order to secure your
system, you must confirm that the following registry settings are set to 0 (zero)
or are not defined (\u003cstrong\u003eNote\u003c/strong\u003e: These registry keys
do not exist by default, and therefore are already at the secure setting.), also
that your Group Policy setting are correct (see FAQ):\u003c/p\u003e\\n\u003cul\
u003e\\n\u003cli\u003eHKEY_LOCAL_MACHINE\\\\SOFTWARE\\\\Policies\\\\Microsoft\\\\
Windows NT\\\\Printers\\\\PointAndPrint\u003c/li\u003e\\n\u003cli\
u003eNoWarningNoElevationOnInstall = 0 (DWORD) or not defined (default setting)\
u003c/li\u003e\\n\u003cli\u003eUpdatePromptSettings = 0 (DWORD) or not defined
(default setting)\u003c/li\u003e\\n\u003c/ul\u003e\\n\u003cp\u003e\u003cstrong\
u003eHaving NoWarningNoElevationOnInstall set to 1 makes your system vulnerable by
design.\u003c/strong\u003e\u003c/p\u003e\\n\u003cp\u003eUPDATE July 6, 2021:
Microsoft has completed the investigation and has released security updates to
address this vulnerability. Please see the Security Updates table for the
applicable update for your system. We recommend that you install these updates
immediately. If you are unable to install these updates, see the FAQ and Workaround
sections in this CVE for information on how to help protect your system from this
vulnerability. See also \u003ca
href=\\\"https://support.microsoft.com/topic/31b91c02-05bc-4ada-a7ea-
183b129578a7\\\"\u003eKB5005010: Restricting installation of new printer drivers
after applying the July 6, 2021 updates\u003c/a\u003e.\u003c/p\u003e\\n\u003cp\
u003eNote that the security updates released on and after July 6, 2021 contain
protections for CVE-2021-1675 and the additional remote code execution exploit in
the Windows Print Spooler service known as \u201cPrintNightmare\u201d, documented
in CVE-2021-34527.\u003c/p\u003e\\n\"},{\"lang\":\"es\",\"value\":\"Una
vulnerabilidad en la ejecuci\u00f3n de c\u00f3digo remota de Windows Print
Spooler\"}],\"metrics\":{\"cvssMetricV31\":
[{\"source\":\"secure@microsoft.com\",\"type\":\"Secondary\",\"cvssData\":
{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/
A:H\",\"baseScore\":8.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"at
tackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\
",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"
HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.8,\"impactScore\"
:5.9},{\"source\":\"nvd@nist.gov\",\"type\":\"Secondary\",\"cvssData\":
{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/
A:H\",\"baseScore\":8.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"at
tackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\
",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"
HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.8,\"impactScore\"
:5.9}],\"cvssMetricV2\":
[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":
{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:S/C:C/I:C/
A:C\",\"baseScore\":9.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\
"authentication\":\"SINGLE\",\"confidentialityImpact\":\"COMPLETE\",\"integrityImpa
ct\":\"COMPLETE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"HIGH\",\"
exploitabilityScore\":8.0,\"impactScore\":10.0,\"acInsufInfo\":false,\"obtainAllPri
vilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userI
nteractionRequired\":false}]},\"cisaExploitAdd\":\"2021-11-
03\",\"cisaActionDue\":\"2021-07-20\",\"cisaRequiredAction\":\"Apply updates per
vendor instructions.\",\"cisaVulnerabilityName\":\"Microsoft Windows Print Spooler
Remote Code Execution Vulnerability\",\"weaknesses\":
[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":
[{\"lang\":\"en\",\"value\":\"CWE-269\"}]}],\"configurations\":[{\"nodes\":
[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":
[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:
*:*:*\",\"versionEndExcluding\":\"10.0.10240.18969\",\"matchCriteriaId\":\"8C882409
-BB85-490B-9D50-571B16C0DE86\"},
{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*
:*:*\",\"versionEndExcluding\":\"10.0.14393.4470\",\"matchCriteriaId\":\"217CDA93-
36DA-49AE-9B8F-61D2E155B4F3\"},
{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*
:*:*\",\"versionEndExcluding\":\"10.0.17763.2029\",\"matchCriteriaId\":\"B9D38F0E-
B058-44EE-9C75-A96EBEA360A6\"},
{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:microsoft:windows_10_20h2:*:*:*:*:*:*
:*:*\",\"versionEndExcluding\":\"10.0.19042.1083\",\"matchCriteriaId\":\"413EBEFB-
B185-4D3E-840B-9F37AA041229\"},
{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*
:*:*\",\"versionEndExcluding\":\"10.0.19044.1415\",\"matchCriteriaId\":\"4B773592-
2AC2-48CD-A6B3-98D2632A2F88\"},
{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*
:*:*\",\"versionEndExcluding\":\"10.0.19045.2251\",\"matchCriteriaId\":\"71F26E89-
0870-4C4A-81FE-F9F793A9E706\"},
{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*
:*:*\",\"versionEndExcluding\":\"10.0.22000.318\",\"matchCriteriaId\":\"193B0B19-
6DD7-4DF3-B133-D66B27C34E9C\"},
{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*
:*:*\",\"versionEndExcluding\":\"10.0.22621.674\",\"matchCriteriaId\":\"9DEC0AE5-
324C-4117-ADFD-D8425D01C575\"},
{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*
\",\"matchCriteriaId\":\"C2B1C231-DE19-4B8F-A4AA-5B3A65276E46\"},
{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*
\",\"matchCriteriaId\":\"E93068DB-549B-45AB-8E5C-00EB5D8B5CF8\"},
{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:
*:*\",\"matchCriteriaId\":\"C6CE5198-C498-4672-AF4C-77AB4BE06C5C\"},
{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*
:*:*:*:*:*\",\"matchCriteriaId\":\"5F422A8C-2C4E-42C8-B420-E0728037E15C\"},
{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:
*:*:*:*:x64:*\",\"matchCriteriaId\":\"AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F\"},
{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*
:*:*:*:*\",\"matchCriteriaId\":\"A7DF96F8-BA6A-4780-9CA3-F719B3F81074\"},
{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:
*:*:*:*:*\",\"matchCriteriaId\":\"DB18C4CE-5917-401E-ACF7-2747084FD36E\"},
{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*
:*:*:*:*\",\"versionEndExcluding\":\"10.0.14393.4470\",\"matchCriteriaId\":\"E90B27
36-F3AC-4CA9-9817-1CCC320B854D\"},
{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*
:*:*:*:*\",\"versionEndExcluding\":\"10.0.17763.2029\",\"matchCriteriaId\":\"81CDEC
CC-4AB5-406B-B265-3C1760D01339\"},
{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*
:*:*:*:*\",\"versionEndExcluding\":\"10.0.20348.230\",\"matchCriteriaId\":\"0663409
D-4AE8-4BD9-85FE-9EAED15AE9DB\"},
{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:microsoft:windows_server_20h2:*:*:*:*
:*:*:*:*\",\"versionEndExcluding\":\"10.0.19042.1083\",\"matchCriteriaId\":\"5B0C7D
E0-3E5C-4112-A7AD-FC195C3E2E62\"}]}]}],\"references\":[{\"url\":\"http://
packetstormsecurity.com/files/167261/Print-Spooler-Remote-DLL-
Injection.html\",\"source\":\"secure@microsoft.com\",\"tags\":[\"Exploit\",\"Third
Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://portal.msrc.microsoft.com/en-
US/security-guidance/advisory/CVE-2021-
34527\",\"source\":\"secure@microsoft.com\",\"tags\":
[\"Mitigation\",\"Patch\",\"Vendor
Advisory\"]},{\"url\":\"http://packetstormsecurity.com/files/167261/Print-Spooler-
Remote-DLL-Injection.html\",\"source\":\"af854a3a-2127-422b-91ae-
364da2661108\",\"tags\":[\"Exploit\",\"Third Party Advisory\",\"VDB Entry\"]},
{\"url\":\"https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-
2021-34527\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":
[\"Mitigation\",\"Patch\",\"Vendor Advisory\"]}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CVE Program
Container\", \"references\": [{\"url\":
\"https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-
34527\", \"tags\": [\"x_refsource_MISC\", \"x_transferred\"]}, {\"url\":
\"http://packetstormsecurity.com/files/167261/Print-Spooler-Remote-DLL-
Injection.html\", \"tags\":
[\"x_refsource_MISC\", \"x_transferred\"]}], \"providerMetadata\":
{\"orgId\": \"af854a3a-2127-422b-91ae-
364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-
04T00:12:50.390Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\":
[{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2021-
34527\", \"role\": \"CISA Coordinator\", \"options\":
[{\"Exploitation\": \"active\"}, {\"Automatable\": \"no\"}, {\"Technical
Impact\": \"total\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-01-
24T16:04:14.042095Z\"}}}, {\"other\": {\"type\": \"kev\", \"content\":
{\"dateAdded\": \"2021-11-03\", \"reference\": \"https://www.cisa.gov/known-
exploited-vulnerabilities-catalog?search_api_fulltext=CVE-2021-
34527\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-
4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-06-
10T18:29:25.377Z\"}}], \"cna\": {\"title\": \"Windows Print Spooler Remote Code
Execution Vulnerability\", \"metrics\": [{\"format\": \"CVSS\", \"cvssV3_1\":
{\"version\": \"3.1\", \"baseScore\":
8.8, \"baseSeverity\": \"HIGH\", \"vectorString\":
\"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C\"}, \"scenarios\":
[{\"lang\": \"en-US\", \"value\": \"GENERAL\"}]}], \"affected\": [{\"cpes\":
[\"cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.2029:*:*:*:*:*:x86:*\", \"cpe:2.3
:o:microsoft:windows_10_1809:10.0.17763.2029:*:*:*:*:*:x64:*\", \"cpe:2.3:o:microso
ft:windows_10_1809:10.0.17763.2029:*:*:*:*:*:arm64:*\"], \"vendor\": \"Microsoft\",
\"product\": \"Windows 10 Version 1809\", \"versions\": [{\"status\": \"affected\",
\"version\": \"10.0.0\", \"lessThan\": \"10.0.17763.2029\", \"versionType\": \"cust
om\"}], \"platforms\": [\"32-bit Systems\", \"x64-based Systems\", \"ARM64-based
Systems\"]}, {\"cpes\":
[\"cpe:2.3:o:microsoft:windows_server_2019:10.0.17763.2029:*:*:*:*:*:*:*\"], \"vend
or\": \"Microsoft\", \"product\": \"Windows Server 2019\", \"versions\":
[{\"status\": \"affected\", \"version\": \"10.0.0\", \"lessThan\": \"10.0.17763.202
9\", \"versionType\": \"custom\"}], \"platforms\": [\"x64-based Systems\"]},
{\"cpes\":
[\"cpe:2.3:o:microsoft:windows_server_2019:10.0.17763.2029:*:*:*:*:*:*:*\"], \"vend
or\": \"Microsoft\", \"product\": \"Windows Server 2019 (Server Core
installation)\", \"versions\": [{\"status\": \"affected\", \"version\": \"10.0.0\",
\"lessThan\": \"10.0.17763.2029\", \"versionType\": \"custom\"}], \"platforms\":
[\"x64-based Systems\"]}, {\"cpes\":
[\"cpe:2.3:o:microsoft:windows_server_2022:10.0.20348.230:*:*:*:*:*:*:*\"], \"vendo
r\": \"Microsoft\", \"product\": \"Windows Server 2022\", \"versions\":
[{\"status\": \"affected\", \"version\": \"10.0.0\", \"lessThan\": \"10.0.20348.230
\", \"versionType\": \"custom\"}], \"platforms\": [\"x64-based Systems\"]},
{\"cpes\":
[\"cpe:2.3:o:microsoft:windows_10_20H2:10.0.19042.1083:*:*:*:*:*:x86:*\", \"cpe:2.3
:o:microsoft:windows_10_20H2:10.0.19042.1083:*:*:*:*:*:arm64:*\"], \"vendor\": \"Mi
crosoft\", \"product\": \"Windows 10 Version 20H2\", \"versions\":
[{\"status\": \"affected\", \"version\": \"10.0.0\", \"lessThan\": \"10.0.19042.108
3\", \"versionType\": \"custom\"}], \"platforms\": [\"32-bit Systems\", \"ARM64-
based Systems\"]}, {\"cpes\":
[\"cpe:2.3:o:microsoft:windows_server_20H2:10.0.19042.1083:*:*:*:*:*:*:*\"], \"vend
or\": \"Microsoft\", \"product\": \"Windows Server version 20H2\", \"versions\":
[{\"status\": \"affected\", \"version\": \"10.0.0\", \"lessThan\": \"10.0.19042.108
3\", \"versionType\": \"custom\"}], \"platforms\": [\"x64-based Systems\"]},
{\"cpes\": [\"cpe:2.3:o:microsoft:windows_11_21H2:10.0.22000.318:*:*:*:*:*:x64:*\",
\"cpe:2.3:o:microsoft:windows_11_21H2:10.0.22000.318:*:*:*:*:*:arm64:*\"], \"vendor
\": \"Microsoft\", \"product\": \"Windows 11 version 21H2\", \"versions\":
[{\"status\": \"affected\", \"version\": \"10.0.0\", \"lessThan\": \"10.0.22000.318
\", \"versionType\": \"custom\"}], \"platforms\": [\"x64-based Systems\", \"ARM64-
based Systems\"]}, {\"cpes\":
[\"cpe:2.3:o:microsoft:windows_10_21H2:10.0.19044.1415:*:*:*:*:*:x86:*\", \"cpe:2.3
:o:microsoft:windows_10_21H2:10.0.19044.1415:*:*:*:*:*:arm64:*\", \"cpe:2.3:o:micro
soft:windows_10_21H2:10.0.19044.1415:*:*:*:*:*:x64:*\"], \"vendor\": \"Microsoft\",
\"product\": \"Windows 10 Version 21H2\", \"versions\": [{\"status\": \"affected\",
\"version\": \"10.0.0\", \"lessThan\": \"10.0.19044.1415\", \"versionType\": \"cust
om\"}], \"platforms\": [\"32-bit Systems\", \"ARM64-based Systems\"]}, {\"cpes\":
[\"cpe:2.3:o:microsoft:windows_11_22H2:10.0.22621.674:*:*:*:*:*:arm64:*\", \"cpe:2.
3:o:microsoft:windows_11_22H2:10.0.22621.674:*:*:*:*:*:x64:*\"], \"vendor\": \"Micr
osoft\", \"product\": \"Windows 11 version 22H2\", \"versions\":
[{\"status\": \"affected\", \"version\": \"10.0.0\", \"lessThan\": \"10.0.22621.674
\", \"versionType\": \"custom\"}], \"platforms\": [\"ARM64-based Systems\", \"x64-
based Systems\"]}, {\"cpes\":
[\"cpe:2.3:o:microsoft:windows_10_22H2:10.0.19045.2251:*:*:*:*:*:x64:*\", \"cpe:2.3
:o:microsoft:windows_10_22H2:10.0.19045.2251:*:*:*:*:*:arm64:*\", \"cpe:2.3:o:micro
soft:windows_10_22H2:10.0.19045.2251:*:*:*:*:*:x86:*\"], \"vendor\": \"Microsoft\",
\"product\": \"Windows 10 Version 22H2\", \"versions\": [{\"status\": \"affected\",
\"version\": \"10.0.0\", \"lessThan\": \"10.0.19045.2251\", \"versionType\": \"cust
om\"}], \"platforms\": [\"x64-based Systems\", \"ARM64-based Systems\", \"32-bit
Systems\"]}, {\"cpes\":
[\"cpe:2.3:o:microsoft:windows_10_1507:10.0.10240.18969:*:*:*:*:*:x86:*\", \"cpe:2.
3:o:microsoft:windows_10_1507:10.0.10240.18969:*:*:*:*:*:x64:*\"], \"vendor\": \"Mi
crosoft\", \"product\": \"Windows 10 Version 1507\", \"versions\":
[{\"status\": \"affected\", \"version\": \"10.0.0\", \"lessThan\": \"10.0.10240.189
69\", \"versionType\": \"custom\"}], \"platforms\": [\"32-bit Systems\", \"x64-
based Systems\"]}, {\"cpes\":
[\"cpe:2.3:o:microsoft:windows_10_1607:10.0.14393.4470:*:*:*:*:*:x86:*\", \"cpe:2.3
:o:microsoft:windows_10_1607:10.0.14393.4470:*:*:*:*:*:x64:*\"], \"vendor\": \"Micr
osoft\", \"product\": \"Windows 10 Version 1607\", \"versions\":
[{\"status\": \"affected\", \"version\": \"10.0.0\", \"lessThan\": \"10.0.14393.447
0\", \"versionType\": \"custom\"}], \"platforms\": [\"32-bit Systems\", \"x64-based
Systems\"]}, {\"cpes\":
[\"cpe:2.3:o:microsoft:windows_server_2016:10.0.14393.4470:*:*:*:*:*:*:*\"], \"vend
or\": \"Microsoft\", \"product\": \"Windows Server 2016\", \"versions\":
[{\"status\": \"affected\", \"version\": \"10.0.0\", \"lessThan\": \"10.0.14393.447
0\", \"versionType\": \"custom\"}], \"platforms\": [\"x64-based Systems\"]},
{\"cpes\":
[\"cpe:2.3:o:microsoft:windows_server_2016:10.0.14393.4470:*:*:*:*:*:*:*\"], \"vend
or\": \"Microsoft\", \"product\": \"Windows Server 2016 (Server Core
installation)\", \"versions\": [{\"status\": \"affected\", \"version\": \"10.0.0\",
\"lessThan\": \"10.0.14393.4470\", \"versionType\": \"custom\"}], \"platforms\":
[\"x64-based Systems\"]}, {\"cpes\":
[\"cpe:2.3:o:microsoft:windows_rt_8.1:6.3.9600.20046:*:*:*:*:*:*:*\"], \"vendor\":
\"Microsoft\", \"product\": \"Windows 8.1\", \"versions\":
[{\"status\": \"affected\", \"version\": \"6.3.0\", \"lessThan\": \"6.3.9600.20046\
", \"versionType\": \"custom\"}], \"platforms\": [\"ARM64-based Systems\"]},
{\"cpes\":
[\"cpe:2.3:o:microsoft:windows_server_2008_sp2:6.0.6003.21138:*:*:*:*:*:x64:*\"], \
"vendor\": \"Microsoft\", \"product\": \"Windows Server 2008 Service Pack
2\", \"versions\":
[{\"status\": \"affected\", \"version\": \"6.0.0\", \"lessThan\": \"6.0.6003.21138\
", \"versionType\": \"custom\"}], \"platforms\": [\"32-bit Systems\"]}, {\"cpes\":
[\"cpe:2.3:o:microsoft:windows_server_2008_sp2:6.0.6003.21138:*:*:*:*:*:x64:*\", \"
cpe:2.3:o:microsoft:windows_server_2008_sp2:6.0.6003.21138:*:*:*:*:*:x86:*\"], \"ve
ndor\": \"Microsoft\", \"product\": \"Windows Server 2008 Service Pack 2 (Server
Core installation)\", \"versions\":
[{\"status\": \"affected\", \"version\": \"6.0.0\", \"lessThan\": \"6.0.6003.21138\
", \"versionType\": \"custom\"}], \"platforms\": [\"32-bit Systems\", \"x64-based
Systems\"]}, {\"cpes\":
[\"cpe:2.3:o:microsoft:windows_server_2008_sp2:6.0.6003.21138:*:*:*:*:*:x86:*\"], \
"vendor\": \"Microsoft\", \"product\": \"Windows Server 2008 Service Pack
2\", \"versions\":
[{\"status\": \"affected\", \"version\": \"6.0.0\", \"lessThan\": \"6.0.6003.21138\
", \"versionType\": \"custom\"}], \"platforms\": [\"x64-based Systems\"]},
{\"cpes\":
[\"cpe:2.3:o:microsoft:windows_server_2008_R2:6.1.7601.25633:*:*:*:*:*:x64:*\"], \"
vendor\": \"Microsoft\", \"product\": \"Windows Server 2008 R2 Service Pack
1\", \"versions\":
[{\"status\": \"affected\", \"version\": \"6.1.0\", \"lessThan\": \"6.1.7601.25633\
", \"versionType\": \"custom\"}], \"platforms\": [\"x64-based Systems\"]},
{\"cpes\":
[\"cpe:2.3:o:microsoft:windows_server_2008_R2:6.1.7601.25633:*:*:*:*:*:x64:*\"], \"
vendor\": \"Microsoft\", \"product\": \"Windows Server 2008 R2 Service Pack 1
(Server Core installation)\", \"versions\":
[{\"status\": \"affected\", \"version\": \"6.0.0\", \"lessThan\": \"6.1.7601.25633\
", \"versionType\": \"custom\"}], \"platforms\": [\"x64-based Systems\"]},
{\"cpes\":
[\"cpe:2.3:o:microsoft:windows_server_2012:6.2.9200.23383:*:*:*:*:*:x64:*\"], \"ven
dor\": \"Microsoft\", \"product\": \"Windows Server 2012\", \"versions\":
[{\"status\": \"affected\", \"version\": \"6.2.0\", \"lessThan\": \"6.2.9200.23383\
", \"versionType\": \"custom\"}], \"platforms\": [\"x64-based Systems\"]},
{\"cpes\":
[\"cpe:2.3:o:microsoft:windows_server_2012:6.2.9200.23383:*:*:*:*:*:x64:*\"],
\"vendor\": \"Microsoft\", \"product\": \"Windows Server 2012 (Server Core
installation)\", \"versions\":
[{\"status\": \"affected\", \"version\": \"6.2.0\", \"lessThan\": \"6.2.9200.23383\
", \"versionType\": \"custom\"}], \"platforms\": [\"x64-based Systems\"]},
{\"cpes\":
[\"cpe:2.3:o:microsoft:windows_server_2012_R2:6.3.9600.20046:*:*:*:*:*:x64:*\"], \"
vendor\": \"Microsoft\", \"product\": \"Windows Server 2012 R2\", \"versions\":
[{\"status\": \"affected\", \"version\": \"6.3.0\", \"lessThan\": \"6.3.9600.20046\
", \"versionType\": \"custom\"}], \"platforms\": [\"x64-based Systems\"]},
{\"cpes\":
[\"cpe:2.3:o:microsoft:windows_server_2012_R2:6.3.9600.20046:*:*:*:*:*:x64:*\"], \"
vendor\": \"Microsoft\", \"product\": \"Windows Server 2012 R2 (Server Core
installation)\", \"versions\":
[{\"status\": \"affected\", \"version\": \"6.3.0\", \"lessThan\": \"6.3.9600.20046\
", \"versionType\": \"custom\"}], \"platforms\": [\"x64-based
Systems\"]}], \"datePublic\": \"2021-07-01T07:00:00+00:00\", \"references\":
[{\"url\": \"https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/
CVE-2021-34527\", \"tags\": [\"x_refsource_MISC\"]}, {\"url\":
\"http://packetstormsecurity.com/files/167261/Print-Spooler-Remote-DLL-
Injection.html\", \"tags\": [\"x_refsource_MISC\"]}], \"descriptions\": [{\"lang\":
\"en-US\", \"value\": \"\u003cp\u003eA remote code execution vulnerability exists
when the Windows Print Spooler service improperly performs privileged file
operations. An attacker who successfully exploited this vulnerability could run
arbitrary code with SYSTEM privileges. An attacker could then install programs;
view, change, or delete data; or create new accounts with full user
rights.\u003c/p\u003e\\n\u003cp\u003eUPDATE July 7, 2021: The security update for
Windows Server 2012, Windows Server 2016 and Windows 10, Version 1607 have been
released. Please see the Security Updates table for the applicable update for your
system. We recommend that you install these updates immediately. If you are unable
to install these updates, see the FAQ and Workaround sections in this CVE for
information on how to help protect your system from this vulnerability.\u003c/p\
u003e\\n\u003cp\u003eIn addition to installing the updates, in order to secure your
system, you must confirm that the following registry settings are set to 0 (zero)
or are not defined (\u003cstrong\u003eNote\u003c/strong\u003e: These registry keys
do not exist by default, and therefore are already at the secure setting.), also
that your Group Policy setting are correct (see FAQ):\u003c/p\u003e\\n\u003cul\
u003e\\n\u003cli\u003eHKEY_LOCAL_MACHINE\\\\SOFTWARE\\\\Policies\\\\Microsoft\\\\
Windows NT\\\\Printers\\\\PointAndPrint\u003c/li\u003e\\n\u003cli\
u003eNoWarningNoElevationOnInstall = 0 (DWORD) or not defined (default setting)\
u003c/li\u003e\\n\u003cli\u003eUpdatePromptSettings = 0 (DWORD) or not defined
(default setting)\u003c/li\u003e\\n\u003c/ul\u003e\\n\u003cp\u003e\u003cstrong\
u003eHaving NoWarningNoElevationOnInstall set to 1 makes your system vulnerable by
design.\u003c/strong\u003e\u003c/p\u003e\\n\u003cp\u003eUPDATE July 6, 2021:
Microsoft has completed the investigation and has released security updates to
address this vulnerability. Please see the Security Updates table for the
applicable update for your system. We recommend that you install these updates
immediately. If you are unable to install these updates, see the FAQ and Workaround
sections in this CVE for information on how to help protect your system from this
vulnerability. See also \u003ca
href=\\\"https://support.microsoft.com/topic/31b91c02-05bc-4ada-a7ea-
183b129578a7\\\"\u003eKB5005010: Restricting installation of new printer drivers
after applying the July 6, 2021 updates\u003c/a\u003e.\u003c/p\u003e\\n\u003cp\
u003eNote that the security updates released on and after July 6, 2021 contain
protections for CVE-2021-1675 and the additional remote code execution exploit in
the Windows Print Spooler service known as \\u201cPrintNightmare\\u201d, documented
in CVE-2021-34527.\u003c/p\u003e\\n\"}], \"problemTypes\": [{\"descriptions\":
[{\"lang\": \"en-US\", \"type\": \"Impact\", \"description\": \"Remote Code
Execution\"}]}], \"providerMetadata\": {\"orgId\": \"f38d906d-7342-40ea-92c1-
6c4a2c6478c8\", \"shortName\": \"microsoft\", \"dateUpdated\": \"2023-12-
28T22:37:17.773Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2021-
34527\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2024-08-
04T00:12:50.390Z\", \"dateReserved\": \"2021-06-
09T00:00:00\", \"assignerOrgId\": \"f38d906d-7342-40ea-92c1-
6c4a2c6478c8\", \"datePublished\": \"2021-07-
02T21:25:11\", \"assignerShortName\": \"microsoft\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
}
}</pre>
</div>
</div>
</div>
</div>

<br />
<ul class="nav nav-tabs" id="pageTab" role="tablist">
<li class="nav-item">
<button class="nav-link active" id="related-tab" data-bs-toggle="tab" data-bs-
target="#related" role="tab" aria-controls="related" aria-selected="true"
href="#related">Related vulnerabilities <span class="badge bg-primary rounded-
pill">4</span></button>
</li>

<li class="nav-item">
<button class="nav-link" id="comments-tab" data-bs-toggle="tab" data-bs-
target="#comments" role="tab" aria-controls="comments" aria-selected="false"
onclick="loadComments()" href="#comments">Comments <span class="badge bg-primary
rounded-pill" id="nb-comments">0</span></button>
</li>
<li class="nav-item">
<button class="nav-link" id="bundles-tab" data-bs-toggle="tab" data-bs-
target="#bundles" role="tab" aria-controls="bundles" aria-selected="false"
onclick="loadBundles()" href="#bundles">Bundles <span class="badge bg-primary
rounded-pill" id="nb-bundles">0</span></button>
</li>
<li class="nav-item">
<button class="nav-link" id="sightings-tab" data-bs-toggle="tab" data-bs-
target="#sightings" role="tab" aria-controls="sightings" aria-selected="false"
onclick="loadSightings()" href="#sightings">Sightings <span class="badge bg-primary
rounded-pill" id="nb-sightings">11</span></button>
</li>
<li class="nav-item">
<button class="nav-link" id="sightingsCorrelations-tab" data-bs-toggle="tab"
data-bs-target="#sightingsCorrelations" role="tab" aria-
controls="sightingsCorrelations" aria-selected="false"
onclick="loadSightingsCorrelations()" href="#sightingsCorrelations">Sightings
correlations</button>
</li>

</ul>
<div class="tab-content" id="pageTabContent">
<div class="tab-pane fade show active" id="related" role="tabpanel" aria-
labelledby="related-tab">
<br />
<div class="row">
<div class="col text-end">
<a class="icon-link" href="/recent/all.atom?vulnerability=CVE-2021-34527"
type="application/atom+xml" title="Atom feed">

<svg class="bi"
width="1em" height="1em" fill="currentColor">

<use xlink:href="/bootstrap/static/icons/bootstrap-icons.svg#rss"/>
</svg>
</a>
<a class="icon-link" href="/recent/all.rss?vulnerability=CVE-2021-34527"
type="application/atom+xml" title="RSS feed">

<svg class="bi"
width="1em" height="1em" fill="currentColor">

<use xlink:href="/bootstrap/static/icons/bootstrap-icons.svg#rss-fill"/>
</svg>
</a>
</div>
</div>

<div class="card">
<div class="card-body">
<h5 class="card-title"><a href="/vuln/gsd-2021-34527">gsd-2021-34527</a></h5>
<h6 class="card-subtitle mb-2 text-body-secondary">
Vulnerability from <a href="https://gsd.id" rel="noreferrer"
target="_blank">gsd</a>
</h6>

<div class="row">
<div class="col-md-2 fw-bold">Modified</div><div class="col">2023-12-13
01:23</div>
</div>
<div class="row">
<div class="col-md-2 fw-bold">Details</div>

<div class="col">Windows Print Spooler Remote Code Execution


Vulnerability</div>

</div>

<div class="row">
<div class="col-md-2 fw-bold">Aliases</div>
<div class="col">
<ul class="list-group list-group-flush">

<li class="list-group-item"><a href="/vuln/CVE-2021-34527">CVE-2021-


34527</a></li>

</ul>
</div>
</div>

<div class="row">
<div class="col-md-2 fw-bold">Aliases</div>
<div class="col">
<a href="/vuln/CVE-2021-34527">CVE-2021-34527</a>
</div>
</div>

<br /><br />


<div class="btn-group" role="group">
<a role="button" class="btn btn-primary" data-bs-toggle="collapse" data-bs-
target="#collapseJsongsd-2021-34527" aria-expanded="false" aria-
controls="collapseJsongsd-2021-34527">
JSON

<svg class="bi"
width="1em" height="1em" fill="currentColor">

<use xlink:href="/bootstrap/static/icons/bootstrap-icons.svg#chevron-down"/>
</svg>

</a>
<div class="btn-group" role="group">
<button id="btnGroupDropShare" type="button" class="btn btn-primary" data-bs-
toggle="dropdown" aria-expanded="false">
Share

<svg class="bi"
width="1em" height="1em" fill="currentColor">

<use xlink:href="/bootstrap/static/icons/bootstrap-icons.svg#chevron-down"/>
</svg>

</button>
<ul class="dropdown-menu" aria-labelledby="btnGroupDropShare">
<li><a class="dropdown-item" href="https://news.ycombinator.com/submitlink?
u=https://cve.circl.lu/vuln/gsd-2021-34527&t=Vulnerability gsd-2021-34527"
target="_blank" title="Share on Hacker News">Hacker News</a></li>
<li><a class="dropdown-item" href="https://www.linkedin.com/shareArticle?
mini=true&url=https://cve.circl.lu/vuln/gsd-2021-34527&title=Vulnerability gsd-
2021-34527" target="_blank" title="Share on LinkedIn">LinkedIn</a></li>
<li><a class="dropdown-item" href="https://mastodonshare.com/?
text=Vulnerability gsd-2021-34527&url=https://cve.circl.lu/vuln/gsd-2021-34527"
target="_blank" title="Share on Mastodon">Mastodon</a></li>
<li><a class="dropdown-item"
href="https://www.newspipe.org/bookmark/bookmarklet?href=https://cve.circl.lu/
vuln/gsd-2021-34527&title=Vulnerability gsd-2021-34527" target="_blank"
title="Share on Newspipe">Newspipe</a></li>
<li><a class="dropdown-item" href="https://api.pinboard.in/v1/posts/add?
url=https://cve.circl.lu/vuln/gsd-2021-34527&description=Vulnerability gsd-2021-
34527" target="_blank" title="Share on Pinboard">Pinboard</a></li>
<li><a class="dropdown-item"
href="https://reddit.com/submit?link=https://cve.circl.lu/vuln/gsd-2021-
34527&title=Vulnerability gsd-2021-34527" target="_blank" title="Share on
Reddit">Reddit</a></li>
</ul>
</div>

<a type="button" class="btn btn-primary" title="Copy to clipboard" aria-


label="Copy to clipboard" onclick="copyToClipboard('gsd-2021-34527')" vuln-id="gsd-
2021-34527" href="#">To clipboard</a>

</div>

<div class="collapse" id="collapseJsongsd-2021-34527">


<br />
<div class="card card-body">
<pre class="json-container" id="containergsd-2021-34527">{
"GSD": {
"alias": "CVE-2021-34527",
"description": "Windows Print Spooler Remote Code Execution Vulnerability",
"id": "GSD-2021-34527",
"references": [
"https://packetstormsecurity.com/files/cve/CVE-2021-34527"
]
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2021-34527"
],
"details": "Windows Print Spooler Remote Code Execution Vulnerability",
"id": "GSD-2021-34527",
"modified": "2023-12-13T01:23:14.222424Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cisa.gov": {
"cveID": "CVE-2021-34527",
"dateAdded": "2021-11-03",
"dueDate": "2021-07-20",
"product": "Windows",
"requiredAction": "Apply updates per vendor instructions.",
"shortDescription": "Windows Print Spooler Remote Code Execution
Vulnerability",
"vendorProject": "Microsoft",
"vulnerabilityName": "\"PrintNightmare\" - Microsoft Windows Print Spooler
Remote Code Execution Vulnerability"
},
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "secure@microsoft.com",
"ID": "CVE-2021-34527",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Windows 10 Version 1809",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_name": "10.0.0",
"version_value": "10.0.17763.2029"
}
]
}
},
{
"product_name": "Windows Server 2019",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_name": "10.0.0",
"version_value": "10.0.17763.2029"
}
]
}
},
{
"product_name": "Windows Server 2019 (Server Core
installation)",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_name": "10.0.0",
"version_value": "10.0.17763.2029"
}
]
}
},
{
"product_name": "Windows Server 2022",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_name": "10.0.0",
"version_value": "10.0.20348.230"
}
]
}
},
{
"product_name": "Windows 10 Version 20H2",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_name": "10.0.0",
"version_value": "10.0.19042.1083"
}
]
}
},
{
"product_name": "Windows Server version 20H2",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_name": "10.0.0",
"version_value": "10.0.19042.1083"
}
]
}
},
{
"product_name": "Windows 11 version 21H2",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_name": "10.0.0",
"version_value": "10.0.22000.318"
}
]
}
},
{
"product_name": "Windows 10 Version 21H2",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_name": "10.0.0",
"version_value": "10.0.19044.1415"
}
]
}
},
{
"product_name": "Windows 11 version 22H2",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_name": "10.0.0",
"version_value": "10.0.22621.674"
}
]
}
},
{
"product_name": "Windows 10 Version 22H2",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_name": "10.0.0",
"version_value": "10.0.19045.2251"
}
]
}
},
{
"product_name": "Windows 10 Version 1507",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_name": "10.0.0",
"version_value": "10.0.10240.18969"
}
]
}
},
{
"product_name": "Windows 10 Version 1607",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_name": "10.0.0",
"version_value": "10.0.14393.4470"
}
]
}
},
{
"product_name": "Windows Server 2016",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_name": "10.0.0",
"version_value": "10.0.14393.4470"
}
]
}
},
{
"product_name": "Windows Server 2016 (Server Core
installation)",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_name": "10.0.0",
"version_value": "10.0.14393.4470"
}
]
}
},
{
"product_name": "Windows 8.1",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_name": "6.3.0",
"version_value": "6.3.9600.20046"
}
]
}
},
{
"product_name": "Windows Server 2008 Service Pack 2",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_name": "6.0.0",
"version_value": "6.0.6003.21138"
}
]
}
},
{
"product_name": "Windows Server 2008 Service Pack 2 (Server
Core installation)",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_name": "6.0.0",
"version_value": "6.0.6003.21138"
}
]
}
},
{
"product_name": "Windows Server 2008 Service Pack 2",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_name": "6.0.0",
"version_value": "6.0.6003.21138"
}
]
}
},
{
"product_name": "Windows Server 2008 R2 Service Pack 1",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_name": "6.1.0",
"version_value": "6.1.7601.25633"
}
]
}
},
{
"product_name": "Windows Server 2008 R2 Service Pack 1 (Server
Core installation)",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_name": "6.0.0",
"version_value": "6.1.7601.25633"
}
]
}
},
{
"product_name": "Windows Server 2012",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_name": "6.2.0",
"version_value": "6.2.9200.23383"
}
]
}
},
{
"product_name": "Windows Server 2012 (Server Core
installation)",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_name": "6.2.0",
"version_value": "6.2.9200.23383"
}
]
}
},
{
"product_name": "Windows Server 2012 R2",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_name": "6.3.0",
"version_value": "6.3.9600.20046"
}
]
}
},
{
"product_name": "Windows Server 2012 R2 (Server Core
installation)",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_name": "6.3.0",
"version_value": "6.3.9600.20046"
}
]
}
}
]
},
"vendor_name": "Microsoft"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "\u003cp\u003eA remote code execution vulnerability exists
when the Windows Print Spooler service improperly performs privileged file
operations. An attacker who successfully exploited this vulnerability could run
arbitrary code with SYSTEM privileges. An attacker could then install programs;
view, change, or delete data; or create new accounts with full user
rights.\u003c/p\u003e\n\u003cp\u003eUPDATE July 7, 2021: The security update for
Windows Server 2012, Windows Server 2016 and Windows 10, Version 1607 have been
released. Please see the Security Updates table for the applicable update for your
system. We recommend that you install these updates immediately. If you are unable
to install these updates, see the FAQ and Workaround sections in this CVE for
information on how to help protect your system from this vulnerability.\u003c/p\
u003e\n\u003cp\u003eIn addition to installing the updates, in order to secure your
system, you must confirm that the following registry settings are set to 0 (zero)
or are not defined (\u003cstrong\u003eNote\u003c/strong\u003e: These registry keys
do not exist by default, and therefore are already at the secure setting.), also
that your Group Policy setting are correct (see FAQ):\u003c/p\u003e\n\u003cul\
u003e\n\u003cli\u003eHKEY_LOCAL_MACHINE\\SOFTWARE\\Policies\\Microsoft\\Windows
NT\\Printers\\PointAndPrint\u003c/li\u003e\n\u003cli\
u003eNoWarningNoElevationOnInstall = 0 (DWORD) or not defined (default setting)\
u003c/li\u003e\n\u003cli\u003eUpdatePromptSettings = 0 (DWORD) or not defined
(default setting)\u003c/li\u003e\n\u003c/ul\u003e\n\u003cp\u003e\u003cstrong\
u003eHaving NoWarningNoElevationOnInstall set to 1 makes your system vulnerable by
design.\u003c/strong\u003e\u003c/p\u003e\n\u003cp\u003eUPDATE July 6, 2021:
Microsoft has completed the investigation and has released security updates to
address this vulnerability. Please see the Security Updates table for the
applicable update for your system. We recommend that you install these updates
immediately. If you are unable to install these updates, see the FAQ and Workaround
sections in this CVE for information on how to help protect your system from this
vulnerability. See also \u003ca
href=\"https://support.microsoft.com/topic/31b91c02-05bc-4ada-a7ea-183b129578a7\"\
u003eKB5005010: Restricting installation of new printer drivers after applying the
July 6, 2021 updates\u003c/a\u003e.\u003c/p\u003e\n\u003cp\u003eNote that the
security updates released on and after July 6, 2021 contain protections for CVE-
2021-1675 and the additional remote code execution exploit in the Windows Print
Spooler service known as \u201cPrintNightmare\u201d, documented in CVE-2021-34527.\
u003c/p\u003e\n"
}
]
},
"impact": {
"cvss": [
{
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString":
"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C",
"version": "3.1"
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Remote Code Execution"
}
]
}
]
},
"references": {
"reference_data": [
{
"name":
"https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-
34527",
"refsource": "MISC",
"url":
"https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-34527"
},
{
"name": "http://packetstormsecurity.com/files/167261/Print-Spooler-
Remote-DLL-Injection.html",
"refsource": "MISC",
"url": "http://packetstormsecurity.com/files/167261/Print-Spooler-
Remote-DLL-Injection.html"
}
]
}
},
"nvd.nist.gov": {
"cve": {
"cisaActionDue": "2021-07-20",
"cisaExploitAdd": "2021-11-03",
"cisaRequiredAction": "Apply updates per vendor instructions.",
"cisaVulnerabilityName": "Microsoft Windows Print Spooler Remote Code
Execution Vulnerability",
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria":
"cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8C882409-BB85-490B-9D50-571B16C0DE86",
"versionEndExcluding": "10.0.10240.18969",
"vulnerable": true
},
{
"criteria":
"cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:*:*",
"matchCriteriaId": "217CDA93-36DA-49AE-9B8F-61D2E155B4F3",
"versionEndExcluding": "10.0.14393.4470",
"vulnerable": true
},
{
"criteria":
"cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B9D38F0E-B058-44EE-9C75-A96EBEA360A6",
"versionEndExcluding": "10.0.17763.2029",
"vulnerable": true
},
{
"criteria":
"cpe:2.3:o:microsoft:windows_10_20h2:*:*:*:*:*:*:*:*",
"matchCriteriaId": "413EBEFB-B185-4D3E-840B-9F37AA041229",
"versionEndExcluding": "10.0.19042.1083",
"vulnerable": true
},
{
"criteria":
"cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*",
"matchCriteriaId": "4B773592-2AC2-48CD-A6B3-98D2632A2F88",
"versionEndExcluding": "10.0.19044.1415",
"vulnerable": true
},
{
"criteria":
"cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*",
"matchCriteriaId": "71F26E89-0870-4C4A-81FE-F9F793A9E706",
"versionEndExcluding": "10.0.19045.2251",
"vulnerable": true
},
{
"criteria":
"cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*",
"matchCriteriaId": "193B0B19-6DD7-4DF3-B133-D66B27C34E9C",
"versionEndExcluding": "10.0.22000.318",
"vulnerable": true
},
{
"criteria":
"cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9DEC0AE5-324C-4117-ADFD-D8425D01C575",
"versionEndExcluding": "10.0.22621.674",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*",
"matchCriteriaId": "C2B1C231-DE19-4B8F-A4AA-5B3A65276E46",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E93068DB-549B-45AB-8E5C-00EB5D8B5CF8",
"vulnerable": true
},
{
"criteria":
"cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C6CE5198-C498-4672-AF4C-77AB4BE06C5C",
"vulnerable": true
},
{
"criteria":
"cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*",
"matchCriteriaId": "5F422A8C-2C4E-42C8-B420-E0728037E15C",
"vulnerable": true
},
{
"criteria":
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
"matchCriteriaId": "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F",
"vulnerable": true
},
{
"criteria":
"cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A7DF96F8-BA6A-4780-9CA3-F719B3F81074",
"vulnerable": true
},
{
"criteria":
"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E",
"vulnerable": true
},
{
"criteria":
"cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E90B2736-F3AC-4CA9-9817-1CCC320B854D",
"versionEndExcluding": "10.0.14393.4470",
"vulnerable": true
},
{
"criteria":
"cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
"matchCriteriaId": "81CDECCC-4AB5-406B-B265-3C1760D01339",
"versionEndExcluding": "10.0.17763.2029",
"vulnerable": true
},
{
"criteria":
"cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0663409D-4AE8-4BD9-85FE-9EAED15AE9DB",
"versionEndExcluding": "10.0.20348.230",
"vulnerable": true
},
{
"criteria":
"cpe:2.3:o:microsoft:windows_server_20h2:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5B0C7DE0-3E5C-4112-A7AD-FC195C3E2E62",
"versionEndExcluding": "10.0.19042.1083",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "\u003cp\u003eA remote code execution vulnerability exists
when the Windows Print Spooler service improperly performs privileged file
operations. An attacker who successfully exploited this vulnerability could run
arbitrary code with SYSTEM privileges. An attacker could then install programs;
view, change, or delete data; or create new accounts with full user
rights.\u003c/p\u003e\n\u003cp\u003eUPDATE July 7, 2021: The security update for
Windows Server 2012, Windows Server 2016 and Windows 10, Version 1607 have been
released. Please see the Security Updates table for the applicable update for your
system. We recommend that you install these updates immediately. If you are unable
to install these updates, see the FAQ and Workaround sections in this CVE for
information on how to help protect your system from this vulnerability.\u003c/p\
u003e\n\u003cp\u003eIn addition to installing the updates, in order to secure your
system, you must confirm that the following registry settings are set to 0 (zero)
or are not defined (\u003cstrong\u003eNote\u003c/strong\u003e: These registry keys
do not exist by default, and therefore are already at the secure setting.), also
that your Group Policy setting are correct (see FAQ):\u003c/p\u003e\n\u003cul\
u003e\n\u003cli\u003eHKEY_LOCAL_MACHINE\\SOFTWARE\\Policies\\Microsoft\\Windows
NT\\Printers\\PointAndPrint\u003c/li\u003e\n\u003cli\
u003eNoWarningNoElevationOnInstall = 0 (DWORD) or not defined (default setting)\
u003c/li\u003e\n\u003cli\u003eUpdatePromptSettings = 0 (DWORD) or not defined
(default setting)\u003c/li\u003e\n\u003c/ul\u003e\n\u003cp\u003e\u003cstrong\
u003eHaving NoWarningNoElevationOnInstall set to 1 makes your system vulnerable by
design.\u003c/strong\u003e\u003c/p\u003e\n\u003cp\u003eUPDATE July 6, 2021:
Microsoft has completed the investigation and has released security updates to
address this vulnerability. Please see the Security Updates table for the
applicable update for your system. We recommend that you install these updates
immediately. If you are unable to install these updates, see the FAQ and Workaround
sections in this CVE for information on how to help protect your system from this
vulnerability. See also \u003ca
href=\"https://support.microsoft.com/topic/31b91c02-05bc-4ada-a7ea-183b129578a7\"\
u003eKB5005010: Restricting installation of new printer drivers after applying the
July 6, 2021 updates\u003c/a\u003e.\u003c/p\u003e\n\u003cp\u003eNote that the
security updates released on and after July 6, 2021 contain protections for CVE-
2021-1675 and the additional remote code execution exploit in the Windows Print
Spooler service known as \u201cPrintNightmare\u201d, documented in CVE-2021-34527.\
u003c/p\u003e\n"
},
{
"lang": "es",
"value": "Una vulnerabilidad en la ejecuci\u00f3n de c\u00f3digo remota
de Windows Print Spooler"
}
],
"id": "CVE-2021-34527",
"lastModified": "2024-02-02T17:24:01.260",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "COMPLETE",
"baseScore": 9.0,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 8.0,
"impactScore": 10.0,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9,
"source": "secure@microsoft.com",
"type": "Primary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Secondary"
}
]
},
"published": "2021-07-02T22:15:08.757",
"references": [
{
"source": "secure@microsoft.com",
"tags": [
"Exploit",
"Third Party Advisory",
"VDB Entry"
],
"url": "http://packetstormsecurity.com/files/167261/Print-Spooler-
Remote-DLL-Injection.html"
},
{
"source": "secure@microsoft.com",
"tags": [
"Mitigation",
"Patch",
"Vendor Advisory"
],
"url":
"https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-34527"
}
],
"sourceIdentifier": "secure@microsoft.com",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-269"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
}
}
}</pre>
</div>
</div>
</div>
</div>

<br />

<div class="card">
<div class="card-body">
<h5 class="card-title"><a href="/vuln/fkie_cve-2021-34527">fkie_cve-2021-
34527</a></h5>
<h6 class="card-subtitle mb-2 text-body-secondary">
Vulnerability from <a href="https://github.com/fkie-cad/nvd-json-data-feeds"
rel="noreferrer" target="_blank">fkie_nvd</a>
</h6>
<div class="row">
<div class="col-md-2 fw-bold">Published</div><div class="col">2021-07-02
22:15</div>
</div>
<div class="row">
<div class="col-md-2 fw-bold">Modified</div><div class="col">2024-11-21
06:10</div>
</div>

<div class="row">
<div class="col-md-2 fw-bold" data-bs-toggle="tooltip" data-bs-
placement="right" title="The Common Vulnerability Scoring System (CVSS) provides a
way to capture the principal characteristics of a vulnerability and produce a
numerical score reflecting its severity.">Severity <span style="color:
green;">?</span></div>
<div class="col">

<span class="bg-danger rounded px-1 text-light">8.8 (High)</span> - <a


href="https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/
C:H/I:H/A:H" rel="noreferrer"
target="_blank">CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</a><br />

<span class="bg-danger rounded px-1 text-light">8.8 (High)</span> - <a


href="https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/
C:H/I:H/A:H" rel="noreferrer"
target="_blank">CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</a><br />

</div>
</div>
<div class="row">
<div class="col-md-2 fw-bold">Summary</div><div class="col">&lt;p&gt;A remote
code execution vulnerability exists when the Windows Print Spooler service
improperly performs privileged file operations. An attacker who successfully
exploited this vulnerability could run arbitrary code with SYSTEM privileges. An
attacker could then install programs; view, change, or delete data; or create new
accounts with full user rights.&lt;/p&gt;
&lt;p&gt;UPDATE July 7, 2021: The security update for Windows Server 2012, Windows
Server 2016 and Windows 10, Version 1607 have been released. Please see the
Security Updates table for the applicable update for your system. We recommend that
you install these updates immediately. If you are unable to install these updates,
see the FAQ and Workaround sections in this CVE for information on how to help
protect your system from this vulnerability.&lt;/p&gt;
&lt;p&gt;In addition to installing the updates, in order to secure your system, you
must confirm that the following registry settings are set to 0 (zero) or are not
defined (&lt;strong&gt;Note&lt;/strong&gt;: These registry keys do not exist by
default, and therefore are already at the secure setting.), also that your Group
Policy setting are correct (see FAQ):&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows NT\Printers\
PointAndPrint&lt;/li&gt;
&lt;li&gt;NoWarningNoElevationOnInstall = 0 (DWORD) or not defined (default
setting)&lt;/li&gt;
&lt;li&gt;UpdatePromptSettings = 0 (DWORD) or not defined (default
setting)&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;Having NoWarningNoElevationOnInstall set to 1 makes your
system vulnerable by design.&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;UPDATE July 6, 2021: Microsoft has completed the investigation and has
released security updates to address this vulnerability. Please see the Security
Updates table for the applicable update for your system. We recommend that you
install these updates immediately. If you are unable to install these updates, see
the FAQ and Workaround sections in this CVE for information on how to help protect
your system from this vulnerability. See also &lt;a
href=&#34;https://support.microsoft.com/topic/31b91c02-05bc-4ada-a7ea-
183b129578a7&#34;&gt;KB5005010: Restricting installation of new printer drivers
after applying the July 6, 2021 updates&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;Note that the security updates released on and after July 6, 2021 contain
protections for CVE-2021-1675 and the additional remote code execution exploit in
the Windows Print Spooler service known as “PrintNightmare”, documented in CVE-
2021-34527.&lt;/p&gt;
</div>
</div>
<div class="row">
<div class="col-md-2 fw-bold">References</div>
<div class="col">

<table class="table table-borderless table-hover">


<thead>
<tr data-bs-toggle="collapse" data-bs-
target="#collapseReferenceTablefkie_cve-2021-34527" aria-expanded="false" aria-
controls="collapseReferenceTablefkie_cve-2021-34527">
<th scope="col" style="width: 20px;"><span class="chevron"
>▼</span></th><th scope="col">URL</th><th scope="col">Tags</th>
</tr>
</thead>
<tbody class="collapse" id="collapseReferenceTablefkie_cve-2021-34527">

<tr><td></td><td><a
href="mailto:secure@microsoft.com">secure@microsoft.com</a></td><td><a
href="http://packetstormsecurity.com/files/167261/Print-Spooler-Remote-DLL-
Injection.html" rel="noreferrer"
target="_blank">http://packetstormsecurity.com/files/167261/Print-Spooler-Remote-
DLL-Injection.html</a></td><td>Exploit, Third Party Advisory, VDB Entry</td></tr>

<tr><td></td><td><a
href="mailto:secure@microsoft.com">secure@microsoft.com</a></td><td><a
href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-
34527" rel="noreferrer"
target="_blank">https://portal.msrc.microsoft.com/en-US/security-guidance/
advisory/CVE-2021-34527</a></td><td>Mitigation, Patch, Vendor Advisory</td></tr>

<tr><td></td><td><a href="mailto:af854a3a-2127-422b-91ae-
364da2661108">af854a3a-2127-422b-91ae-364da2661108</a></td><td><a
href="http://packetstormsecurity.com/files/167261/Print-Spooler-Remote-DLL-
Injection.html" rel="noreferrer"
target="_blank">http://packetstormsecurity.com/files/167261/Print-Spooler-Remote-
DLL-Injection.html</a></td><td>Exploit, Third Party Advisory, VDB Entry</td></tr>

<tr><td></td><td><a href="mailto:af854a3a-2127-422b-91ae-
364da2661108">af854a3a-2127-422b-91ae-364da2661108</a></td><td><a
href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-
34527" rel="noreferrer"
target="_blank">https://portal.msrc.microsoft.com/en-US/security-guidance/
advisory/CVE-2021-34527</a></td><td>Mitigation, Patch, Vendor Advisory</td></tr>

</tbody>
</table>
</div>
</div>

<div class="row">
<div class="col-md-2 fw-bold">Impacted products</div>
<div class="col">
<table class="table table-borderless table-hover">
<thead>
<tr>
<th scope="col" style="width: 20px;"></th>
<th scope="col">Vendor</th>
<th scope="col">Product</th>
<th scope="col">Version</th>
</tr>
</thead>
<tbody>
<tr>
<td></td>
<td><a href="/search?vendor=microsoft">microsoft</a></td>
<td><a href="/search?
vendor=microsoft&amp;product=windows_10_1507">windows_10_1507</a></td>
<td>*</td>
</tr>

<tr>
<td></td>
<td><a href="/search?vendor=microsoft">microsoft</a></td>
<td><a href="/search?
vendor=microsoft&amp;product=windows_10_1607">windows_10_1607</a></td>
<td>*</td>
</tr>

<tr>
<td></td>
<td><a href="/search?vendor=microsoft">microsoft</a></td>
<td><a href="/search?
vendor=microsoft&amp;product=windows_10_1809">windows_10_1809</a></td>
<td>*</td>
</tr>

<tr>
<td></td>
<td><a href="/search?vendor=microsoft">microsoft</a></td>
<td><a href="/search?
vendor=microsoft&amp;product=windows_10_20h2">windows_10_20h2</a></td>
<td>*</td>
</tr>

<tr>
<td></td>
<td><a href="/search?vendor=microsoft">microsoft</a></td>
<td><a href="/search?
vendor=microsoft&amp;product=windows_10_21h2">windows_10_21h2</a></td>
<td>*</td>
</tr>

<tr>
<td></td>
<td><a href="/search?vendor=microsoft">microsoft</a></td>
<td><a href="/search?
vendor=microsoft&amp;product=windows_10_22h2">windows_10_22h2</a></td>
<td>*</td>
</tr>

<tr>
<td></td>
<td><a href="/search?vendor=microsoft">microsoft</a></td>
<td><a href="/search?
vendor=microsoft&amp;product=windows_11_21h2">windows_11_21h2</a></td>
<td>*</td>
</tr>

<tr>
<td></td>
<td><a href="/search?vendor=microsoft">microsoft</a></td>
<td><a href="/search?
vendor=microsoft&amp;product=windows_11_22h2">windows_11_22h2</a></td>
<td>*</td>
</tr>

<tr>
<td></td>
<td><a href="/search?vendor=microsoft">microsoft</a></td>
<td><a href="/search?
vendor=microsoft&amp;product=windows_7">windows_7</a></td>
<td>-</td>
</tr>

<tr>
<td></td>
<td><a href="/search?vendor=microsoft">microsoft</a></td>
<td><a href="/search?
vendor=microsoft&amp;product=windows_8.1">windows_8.1</a></td>
<td>-</td>
</tr>

<tr>
<td></td>
<td><a href="/search?vendor=microsoft">microsoft</a></td>
<td><a href="/search?
vendor=microsoft&amp;product=windows_rt_8.1">windows_rt_8.1</a></td>
<td>-</td>
</tr>
<tr>
<td></td>
<td><a href="/search?vendor=microsoft">microsoft</a></td>
<td><a href="/search?
vendor=microsoft&amp;product=windows_server_2008">windows_server_2008</a></td>
<td>-</td>
</tr>

<tr>
<td></td>
<td><a href="/search?vendor=microsoft">microsoft</a></td>
<td><a href="/search?
vendor=microsoft&amp;product=windows_server_2008">windows_server_2008</a></td>
<td>r2</td>
</tr>

<tr>
<td></td>
<td><a href="/search?vendor=microsoft">microsoft</a></td>
<td><a href="/search?
vendor=microsoft&amp;product=windows_server_2012">windows_server_2012</a></td>
<td>-</td>
</tr>

<tr>
<td></td>
<td><a href="/search?vendor=microsoft">microsoft</a></td>
<td><a href="/search?
vendor=microsoft&amp;product=windows_server_2012">windows_server_2012</a></td>
<td>r2</td>
</tr>

<tr>
<td></td>
<td><a href="/search?vendor=microsoft">microsoft</a></td>
<td><a href="/search?
vendor=microsoft&amp;product=windows_server_2016">windows_server_2016</a></td>
<td>*</td>
</tr>
<tr>
<td></td>
<td><a href="/search?vendor=microsoft">microsoft</a></td>
<td><a href="/search?
vendor=microsoft&amp;product=windows_server_2019">windows_server_2019</a></td>
<td>*</td>
</tr>

<tr>
<td></td>
<td><a href="/search?vendor=microsoft">microsoft</a></td>
<td><a href="/search?
vendor=microsoft&amp;product=windows_server_2022">windows_server_2022</a></td>
<td>*</td>
</tr>

<tr>
<td></td>
<td><a href="/search?vendor=microsoft">microsoft</a></td>
<td><a href="/search?
vendor=microsoft&amp;product=windows_server_20h2">windows_server_20h2</a></td>
<td>*</td>
</tr>

</tbody>
</table>
</div>
</div>

<br /><br />


<div class="btn-group" role="group">
<a role="button" class="btn btn-primary" data-bs-toggle="collapse" data-bs-
target="#collapseJsonfkie_cve-2021-34527" aria-expanded="false" aria-
controls="collapseJsonfkie_cve-2021-34527">
JSON

<svg class="bi"
width="1em" height="1em" fill="currentColor">

<use xlink:href="/bootstrap/static/icons/bootstrap-icons.svg#chevron-down"/>
</svg>

</a>
<div class="btn-group" role="group">
<button id="btnGroupDropShare" type="button" class="btn btn-primary" data-bs-
toggle="dropdown" aria-expanded="false">
Share

<svg class="bi"
width="1em" height="1em" fill="currentColor">

<use xlink:href="/bootstrap/static/icons/bootstrap-icons.svg#chevron-down"/>
</svg>

</button>
<ul class="dropdown-menu" aria-labelledby="btnGroupDropShare">
<li><a class="dropdown-item" href="https://news.ycombinator.com/submitlink?
u=https://cve.circl.lu/vuln/fkie_cve-2021-34527&t=Vulnerability fkie_cve-2021-
34527" target="_blank" title="Share on Hacker News">Hacker News</a></li>
<li><a class="dropdown-item" href="https://www.linkedin.com/shareArticle?
mini=true&url=https://cve.circl.lu/vuln/fkie_cve-2021-34527&title=Vulnerability
fkie_cve-2021-34527" target="_blank" title="Share on LinkedIn">LinkedIn</a></li>
<li><a class="dropdown-item" href="https://mastodonshare.com/?
text=Vulnerability fkie_cve-2021-34527&url=https://cve.circl.lu/vuln/fkie_cve-2021-
34527" target="_blank" title="Share on Mastodon">Mastodon</a></li>
<li><a class="dropdown-item"
href="https://www.newspipe.org/bookmark/bookmarklet?href=https://cve.circl.lu/
vuln/fkie_cve-2021-34527&title=Vulnerability fkie_cve-2021-34527" target="_blank"
title="Share on Newspipe">Newspipe</a></li>
<li><a class="dropdown-item" href="https://api.pinboard.in/v1/posts/add?
url=https://cve.circl.lu/vuln/fkie_cve-2021-34527&description=Vulnerability
fkie_cve-2021-34527" target="_blank" title="Share on Pinboard">Pinboard</a></li>
<li><a class="dropdown-item"
href="https://reddit.com/submit?link=https://cve.circl.lu/vuln/fkie_cve-2021-
34527&title=Vulnerability fkie_cve-2021-34527" target="_blank" title="Share on
Reddit">Reddit</a></li>
</ul>
</div>

<a type="button" class="btn btn-primary" title="Copy to clipboard" aria-


label="Copy to clipboard" onclick="copyToClipboard('fkie_cve-2021-34527')" vuln-
id="fkie_cve-2021-34527" href="#">To clipboard</a>

</div>

<div class="collapse" id="collapseJsonfkie_cve-2021-34527">


<br />
<div class="card card-body">
<pre class="json-container" id="containerfkie_cve-2021-34527">{
"cisaActionDue": "2021-07-20",
"cisaExploitAdd": "2021-11-03",
"cisaRequiredAction": "Apply updates per vendor instructions.",
"cisaVulnerabilityName": "Microsoft Windows Print Spooler Remote Code Execution
Vulnerability",
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8C882409-BB85-490B-9D50-571B16C0DE86",
"versionEndExcluding": "10.0.10240.18969",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:*:*",
"matchCriteriaId": "217CDA93-36DA-49AE-9B8F-61D2E155B4F3",
"versionEndExcluding": "10.0.14393.4470",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B9D38F0E-B058-44EE-9C75-A96EBEA360A6",
"versionEndExcluding": "10.0.17763.2029",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:microsoft:windows_10_20h2:*:*:*:*:*:*:*:*",
"matchCriteriaId": "413EBEFB-B185-4D3E-840B-9F37AA041229",
"versionEndExcluding": "10.0.19042.1083",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*",
"matchCriteriaId": "4B773592-2AC2-48CD-A6B3-98D2632A2F88",
"versionEndExcluding": "10.0.19044.1415",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*",
"matchCriteriaId": "71F26E89-0870-4C4A-81FE-F9F793A9E706",
"versionEndExcluding": "10.0.19045.2251",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*",
"matchCriteriaId": "193B0B19-6DD7-4DF3-B133-D66B27C34E9C",
"versionEndExcluding": "10.0.22000.318",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9DEC0AE5-324C-4117-ADFD-D8425D01C575",
"versionEndExcluding": "10.0.22621.674",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*",
"matchCriteriaId": "C2B1C231-DE19-4B8F-A4AA-5B3A65276E46",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E93068DB-549B-45AB-8E5C-00EB5D8B5CF8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C6CE5198-C498-4672-AF4C-77AB4BE06C5C",
"vulnerable": true
},
{
"criteria":
"cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*",
"matchCriteriaId": "5F422A8C-2C4E-42C8-B420-E0728037E15C",
"vulnerable": true
},
{
"criteria":
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
"matchCriteriaId": "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F",
"vulnerable": true
},
{
"criteria":
"cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A7DF96F8-BA6A-4780-9CA3-F719B3F81074",
"vulnerable": true
},
{
"criteria":
"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E",
"vulnerable": true
},
{
"criteria":
"cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E90B2736-F3AC-4CA9-9817-1CCC320B854D",
"versionEndExcluding": "10.0.14393.4470",
"vulnerable": true
},
{
"criteria":
"cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
"matchCriteriaId": "81CDECCC-4AB5-406B-B265-3C1760D01339",
"versionEndExcluding": "10.0.17763.2029",
"vulnerable": true
},
{
"criteria":
"cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0663409D-4AE8-4BD9-85FE-9EAED15AE9DB",
"versionEndExcluding": "10.0.20348.230",
"vulnerable": true
},
{
"criteria":
"cpe:2.3:o:microsoft:windows_server_20h2:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5B0C7DE0-3E5C-4112-A7AD-FC195C3E2E62",
"versionEndExcluding": "10.0.19042.1083",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "\u003cp\u003eA remote code execution vulnerability exists when the
Windows Print Spooler service improperly performs privileged file operations. An
attacker who successfully exploited this vulnerability could run arbitrary code
with SYSTEM privileges. An attacker could then install programs; view, change, or
delete data; or create new accounts with full user rights.\u003c/p\u003e\n\u003cp\
u003eUPDATE July 7, 2021: The security update for Windows Server 2012, Windows
Server 2016 and Windows 10, Version 1607 have been released. Please see the
Security Updates table for the applicable update for your system. We recommend that
you install these updates immediately. If you are unable to install these updates,
see the FAQ and Workaround sections in this CVE for information on how to help
protect your system from this vulnerability.\u003c/p\u003e\n\u003cp\u003eIn
addition to installing the updates, in order to secure your system, you must
confirm that the following registry settings are set to 0 (zero) or are not defined
(\u003cstrong\u003eNote\u003c/strong\u003e: These registry keys do not exist by
default, and therefore are already at the secure setting.), also that your Group
Policy setting are correct (see FAQ):\u003c/p\u003e\n\u003cul\u003e\n\u003cli\
u003eHKEY_LOCAL_MACHINE\\SOFTWARE\\Policies\\Microsoft\\Windows NT\\Printers\\
PointAndPrint\u003c/li\u003e\n\u003cli\u003eNoWarningNoElevationOnInstall = 0
(DWORD) or not defined (default setting)\u003c/li\u003e\n\u003cli\
u003eUpdatePromptSettings = 0 (DWORD) or not defined (default setting)\u003c/li\
u003e\n\u003c/ul\u003e\n\u003cp\u003e\u003cstrong\u003eHaving
NoWarningNoElevationOnInstall set to 1 makes your system vulnerable by design.\
u003c/strong\u003e\u003c/p\u003e\n\u003cp\u003eUPDATE July 6, 2021: Microsoft has
completed the investigation and has released security updates to address this
vulnerability. Please see the Security Updates table for the applicable update for
your system. We recommend that you install these updates immediately. If you are
unable to install these updates, see the FAQ and Workaround sections in this CVE
for information on how to help protect your system from this vulnerability. See
also \u003ca href=\"https://support.microsoft.com/topic/31b91c02-05bc-4ada-a7ea-
183b129578a7\"\u003eKB5005010: Restricting installation of new printer drivers
after applying the July 6, 2021 updates\u003c/a\u003e.\u003c/p\u003e\n\u003cp\
u003eNote that the security updates released on and after July 6, 2021 contain
protections for CVE-2021-1675 and the additional remote code execution exploit in
the Windows Print Spooler service known as \u201cPrintNightmare\u201d, documented
in CVE-2021-34527.\u003c/p\u003e\n"
},
{
"lang": "es",
"value": "Una vulnerabilidad en la ejecuci\u00f3n de c\u00f3digo remota de
Windows Print Spooler"
}
],
"id": "CVE-2021-34527",
"lastModified": "2024-11-21T06:10:36.397",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "COMPLETE",
"baseScore": 9.0,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 8.0,
"impactScore": 10.0,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9,
"source": "secure@microsoft.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Secondary"
}
]
},
"published": "2021-07-02T22:15:08.757",
"references": [
{
"source": "secure@microsoft.com",
"tags": [
"Exploit",
"Third Party Advisory",
"VDB Entry"
],
"url": "http://packetstormsecurity.com/files/167261/Print-Spooler-Remote-DLL-
Injection.html"
},
{
"source": "secure@microsoft.com",
"tags": [
"Mitigation",
"Patch",
"Vendor Advisory"
],
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/
CVE-2021-34527"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory",
"VDB Entry"
],
"url": "http://packetstormsecurity.com/files/167261/Print-Spooler-Remote-DLL-
Injection.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mitigation",
"Patch",
"Vendor Advisory"
],
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/
CVE-2021-34527"
}
],
"sourceIdentifier": "secure@microsoft.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-269"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}</pre>
</div>
</div>
</div>
</div>

<br />

<div class="card">
<div class="card-body">
<h5 class="card-title"><a href="/vuln/ghsa-75f9-mm5v-2rgm">ghsa-75f9-mm5v-
2rgm</a></h5>
<h6 class="card-subtitle mb-2 text-body-secondary">
Vulnerability from <a href="https://github.com/advisories" rel="noreferrer"
target="_blank">github</a>
</h6>
<div class="row">
<div class="col-md-2 fw-bold">Published</div><div class="col">2022-05-24
19:06</div>
</div>
<div class="row">
<div class="col-md-2 fw-bold">Modified</div><div class="col">2022-05-26
00:01</div>
</div>

<div class="row">
<div class="col-md-2 fw-bold" data-bs-toggle="tooltip" data-bs-
placement="right" title="The Common Vulnerability Scoring System (CVSS) provides a
way to capture the principal characteristics of a vulnerability and produce a
numerical score reflecting its severity.">Severity <span style="color:
green;">?</span></div>
<div class="col">

<span class="bg-danger rounded px-1 text-light">8.8 (High)</span> - <a


href="https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/
C:H/I:H/A:H" rel="noreferrer"
target="_blank">CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</a><br />

</div>
</div>

<div class="row">
<div class="col-md-2 fw-bold">Details</div><div class="col"><p>Windows Print
Spooler Remote Code Execution Vulnerability</p></div>
</div>

<a href="https://github.com/advisories/ghsa-75f9-mm5v-2rgm" class="card-link"


rel="noreferrer" target="_blank">Show details on source website</a>

<br /><br />


<div class="btn-group" role="group">
<a role="button" class="btn btn-primary" data-bs-toggle="collapse" data-bs-
target="#collapseJsonghsa-75f9-mm5v-2rgm" aria-expanded="false" aria-
controls="collapseJsonghsa-75f9-mm5v-2rgm">
JSON

<svg class="bi"
width="1em" height="1em" fill="currentColor">

<use xlink:href="/bootstrap/static/icons/bootstrap-icons.svg#chevron-down"/>
</svg>

</a>
<div class="btn-group" role="group">
<button id="btnGroupDropShare" type="button" class="btn btn-primary" data-bs-
toggle="dropdown" aria-expanded="false">
Share

<svg class="bi"
width="1em" height="1em" fill="currentColor">

<use xlink:href="/bootstrap/static/icons/bootstrap-icons.svg#chevron-down"/>
</svg>

</button>
<ul class="dropdown-menu" aria-labelledby="btnGroupDropShare">
<li><a class="dropdown-item" href="https://news.ycombinator.com/submitlink?
u=https://cve.circl.lu/vuln/ghsa-75f9-mm5v-2rgm&t=Vulnerability ghsa-75f9-mm5v-
2rgm" target="_blank" title="Share on Hacker News">Hacker News</a></li>
<li><a class="dropdown-item" href="https://www.linkedin.com/shareArticle?
mini=true&url=https://cve.circl.lu/vuln/ghsa-75f9-mm5v-2rgm&title=Vulnerability
ghsa-75f9-mm5v-2rgm" target="_blank" title="Share on LinkedIn">LinkedIn</a></li>
<li><a class="dropdown-item" href="https://mastodonshare.com/?
text=Vulnerability ghsa-75f9-mm5v-2rgm&url=https://cve.circl.lu/vuln/ghsa-75f9-
mm5v-2rgm" target="_blank" title="Share on Mastodon">Mastodon</a></li>
<li><a class="dropdown-item"
href="https://www.newspipe.org/bookmark/bookmarklet?href=https://cve.circl.lu/
vuln/ghsa-75f9-mm5v-2rgm&title=Vulnerability ghsa-75f9-mm5v-2rgm" target="_blank"
title="Share on Newspipe">Newspipe</a></li>
<li><a class="dropdown-item" href="https://api.pinboard.in/v1/posts/add?
url=https://cve.circl.lu/vuln/ghsa-75f9-mm5v-2rgm&description=Vulnerability ghsa-
75f9-mm5v-2rgm" target="_blank" title="Share on Pinboard">Pinboard</a></li>
<li><a class="dropdown-item"
href="https://reddit.com/submit?link=https://cve.circl.lu/vuln/ghsa-75f9-mm5v-
2rgm&title=Vulnerability ghsa-75f9-mm5v-2rgm" target="_blank" title="Share on
Reddit">Reddit</a></li>
</ul>
</div>

<a type="button" class="btn btn-primary" title="Copy to clipboard" aria-


label="Copy to clipboard" onclick="copyToClipboard('ghsa-75f9-mm5v-2rgm')" vuln-
id="ghsa-75f9-mm5v-2rgm" href="#">To clipboard</a>

</div>

<div class="collapse" id="collapseJsonghsa-75f9-mm5v-2rgm">


<br />
<div class="card card-body">
<pre class="json-container" id="containerghsa-75f9-mm5v-2rgm">{
"affected": [],
"aliases": [
"CVE-2021-34527"
],
"database_specific": {
"cwe_ids": [
"CWE-269"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2021-07-02T22:15:00Z",
"severity": "HIGH"
},
"details": "Windows Print Spooler Remote Code Execution Vulnerability",
"id": "GHSA-75f9-mm5v-2rgm",
"modified": "2022-05-26T00:01:23Z",
"published": "2022-05-24T19:06:54Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-34527"
},
{
"type": "WEB",
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/
CVE-2021-34527"
},
{
"type": "WEB",
"url": "https://www.kb.cert.org/vuls/id/383432"
},
{
"type": "WEB",
"url": "http://packetstormsecurity.com/files/167261/Print-Spooler-Remote-DLL-
Injection.html"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
]
}</pre>
</div>
</div>
</div>
</div>

<br />

<div class="card">
<div class="card-body">
<h5 class="card-title"><a href="/vuln/var-202107-1010">var-202107-1010</a></h5>
<h6 class="card-subtitle mb-2 text-body-secondary">
Vulnerability from <a href="https://www.variotdbs.pl/vulns/"
rel="noreferrer" target="_blank">variot</a>
</h6>
<p class="card-text"><p>A remote code execution vulnerability exists when the
Windows Print Spooler service improperly performs privileged file operations. An
attacker who successfully exploited this vulnerability could run arbitrary code
with SYSTEM privileges. An attacker could then install programs; view, change, or
delete data; or create new accounts with full user rights.</p>
<p>UPDATE July 7, 2021: The security update for Windows Server 2012, Windows Server
2016 and Windows 10, Version 1607 have been released. Please see the Security
Updates table for the applicable update for your system. We recommend that you
install these updates immediately. If you are unable to install these updates, see
the FAQ and Workaround sections in this CVE for information on how to help protect
your system from this vulnerability.</p>
<p>In addition to installing the updates, in order to secure your system, you must
confirm that the following registry settings are set to 0 (zero) or are not defined
(<strong>Note</strong>: These registry keys do not exist by default, and therefore
are already at the secure setting.), also that your Group Policy setting are
correct (see FAQ):</p>
<ul>
<li>HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows NT\Printers\
PointAndPrint</li>
<li>NoWarningNoElevationOnInstall = 0 (DWORD) or not defined (default setting)</li>
<li>UpdatePromptSettings = 0 (DWORD) or not defined (default setting)</li>
</ul>
<p><strong>Having NoWarningNoElevationOnInstall set to 1 makes your system
vulnerable by design.</strong></p>
<p>UPDATE July 6, 2021: Microsoft has completed the investigation and has released
security updates to address this vulnerability. Please see the Security Updates
table for the applicable update for your system. We recommend that you install
these updates immediately. If you are unable to install these updates, see the FAQ
and Workaround sections in this CVE for information on how to help protect your
system from this vulnerability. See also <a
href="https://support.microsoft.com/topic/31b91c02-05bc-4ada-a7ea-
183b129578a7">KB5005010: Restricting installation of new printer drivers after
applying the July 6, 2021 updates</a>.</p>
<p>Note that the security updates released on and after July 6, 2021 contain
protections for CVE-2021-1675 and the additional remote code execution exploit in
the Windows Print Spooler service known as “PrintNightmare”, documented in CVE-
2021-34527.</p>
<p>. Print Spooler The service is a service for realizing the waiting for printing
in printing. RpcAddPrinterDriverEx() The function is used by the above services to
install the printer driver. Parameters DRIVER_CONTAINER Objects and parameters
dwFileCopyFlags Controls the printer driver to be installed and how to copy files.
If you are an authenticated user RpcAddPrinterDriverEx() The function can be
executed. Therefore, an attacker who has obtained the authentication information
can specify and install the driver on the remote server.By an authenticated remote
third party SYSTEM Arbitrary code can be executed with privileges. Windows Print
Spooler is a printer spooler for Windows.
Microsoft Windows Print Spooler Components 存在安全漏洞,攻击者可以通过该漏洞绕过 PfcAddPrinterDriver 的
安全验证,并在打印服务器中安装恶意的驱动程序。以下产品和版本受到影响:Windows 10 Version 1809 for 32-bit
Systems,Windows 10 Version 1809 for x64-based Systems,Windows 10 Version 1809 for
ARM64-based Systems,Windows Server 2019,Windows Server 2019 (Server Core
installation),Windows 10 Version 1909 for 32-bit Systems,Windows 10 Version 1909
for x64-based Systems,Windows 10 Version 1909 for ARM64-based Systems,Windows
Server, version 1909 (Server Core installation),Windows 10 Version 21H1 for x64-
based Systems,Windows 10 Version 21H1 for ARM64-based Systems,Windows 10 Version
21H1 for 32-bit Systems,Windows 10 Version 2004 for 32-bit Systems,Windows 10
Version 2004 for ARM64-based Systems,Windows 10 Version 2004 for x64-based
Systems,Windows Server, version 2004 (Server Core installation),Windows 10 Version
20H2 for x64-based Systems,Windows 10 Version 20H2 for 32-bit Systems,Windows 10
Version 20H2 for ARM64-based Systems,Windows Server, version 20H2 (Server Core
Installation),Windows 10 for 32-bit Systems,Windows 10 for x64-based
Systems,Windows 10 Version 1607 for 32-bit Systems,Windows 10 Version 1607 for x64-
based Systems,Windows Server 2016,Windows Server 2016 (Server Core
installation),Windows 7 for 32-bit Systems Service Pack 1,Windows 7 for x64-based
Systems Service Pack 1,Windows 8.1 for 32-bit systems,Windows 8.1 for x64-based
systems,Windows RT 8.1,Windows Server 2008 for 32-bit Systems Service Pack
2,Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core
installation),Windows Server 2008 for x64-based Systems Service Pack 2,Windows
Server 2008 for x64-based Systems Service Pack 2 (Server Core installation),Windows
Server 2008 R2 for x64-based Systems Service Pack 1,Windows Server 2008 R2 for x64-
based Systems Service Pack 1 (Server Core installation),Windows Server 2012,Windows
Server 2012 (Server Core installation),Windows Server 2012 R2,Windows Server 2012
R2 (Server Core installation). Pillow is a Python-based image processing library.
There is currently no information about this vulnerability, please feel free to
follow CNNVD or manufacturer announcements</p></p>
<a href="https://www.variotdbs.pl/vuln/VAR-202107-1010" class="card-link"
rel="noreferrer" target="_blank">Show details on source website</a>

<br /><br />


<div class="btn-group" role="group">
<a role="button" class="btn btn-primary" data-bs-toggle="collapse" data-bs-
target="#collapseJsonvar-202107-1010" aria-expanded="false" aria-
controls="collapseJsonvar-202107-1010">
JSON

<svg class="bi"
width="1em" height="1em" fill="currentColor">

<use xlink:href="/bootstrap/static/icons/bootstrap-icons.svg#chevron-down"/>
</svg>

</a>
<div class="btn-group" role="group">
<button id="btnGroupDropShare" type="button" class="btn btn-primary" data-bs-
toggle="dropdown" aria-expanded="false">
Share

<svg class="bi"
width="1em" height="1em" fill="currentColor">

<use xlink:href="/bootstrap/static/icons/bootstrap-icons.svg#chevron-down"/>
</svg>

</button>
<ul class="dropdown-menu" aria-labelledby="btnGroupDropShare">
<li><a class="dropdown-item" href="https://news.ycombinator.com/submitlink?
u=https://cve.circl.lu/vuln/var-202107-1010&t=Vulnerability var-202107-1010"
target="_blank" title="Share on Hacker News">Hacker News</a></li>
<li><a class="dropdown-item" href="https://www.linkedin.com/shareArticle?
mini=true&url=https://cve.circl.lu/vuln/var-202107-1010&title=Vulnerability var-
202107-1010" target="_blank" title="Share on LinkedIn">LinkedIn</a></li>
<li><a class="dropdown-item" href="https://mastodonshare.com/?
text=Vulnerability var-202107-1010&url=https://cve.circl.lu/vuln/var-202107-1010"
target="_blank" title="Share on Mastodon">Mastodon</a></li>
<li><a class="dropdown-item"
href="https://www.newspipe.org/bookmark/bookmarklet?href=https://cve.circl.lu/
vuln/var-202107-1010&title=Vulnerability var-202107-1010" target="_blank"
title="Share on Newspipe">Newspipe</a></li>
<li><a class="dropdown-item" href="https://api.pinboard.in/v1/posts/add?
url=https://cve.circl.lu/vuln/var-202107-1010&description=Vulnerability var-202107-
1010" target="_blank" title="Share on Pinboard">Pinboard</a></li>
<li><a class="dropdown-item"
href="https://reddit.com/submit?link=https://cve.circl.lu/vuln/var-202107-
1010&title=Vulnerability var-202107-1010" target="_blank" title="Share on
Reddit">Reddit</a></li>
</ul>
</div>

<a type="button" class="btn btn-primary" title="Copy to clipboard" aria-


label="Copy to clipboard" onclick="copyToClipboard('var-202107-1010')" vuln-
id="var-202107-1010" href="#">To clipboard</a>

</div>

<div class="collapse" id="collapseJsonvar-202107-1010">


<br />
<div class="card card-body">
<pre class="json-container" id="containervar-202107-1010">{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-202107-1010",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "windows server",
"scope": "eq",
"trust": 2.4,
"vendor": "microsoft",
"version": "2016"
},
{
"model": "windows server r2 for x64-based systems service pack",
"scope": "eq",
"trust": 1.2,
"vendor": "microsoft",
"version": "20081"
},
{
"model": "windows server r2",
"scope": "eq",
"trust": 1.2,
"vendor": "microsoft",
"version": "2012"
},
{
"model": "windows server",
"scope": "eq",
"trust": 1.2,
"vendor": "microsoft",
"version": "2019"
},
{
"model": "windows server for 32-bit systems servicepack",
"scope": "eq",
"trust": 1.2,
"vendor": "microsoft",
"version": "20082"
},
{
"model": "windows 10 1507",
"scope": "lt",
"trust": 1.0,
"vendor": "microsoft",
"version": "10.0.10240.18969"
},
{
"model": "windows 10 1607",
"scope": "lt",
"trust": 1.0,
"vendor": "microsoft",
"version": "10.0.14393.4470"
},
{
"model": "windows 8.1",
"scope": "eq",
"trust": 1.0,
"vendor": "microsoft",
"version": null
},
{
"model": "windows server 2019",
"scope": "lt",
"trust": 1.0,
"vendor": "microsoft",
"version": "10.0.17763.2029"
},
{
"model": "windows server 2022",
"scope": "lt",
"trust": 1.0,
"vendor": "microsoft",
"version": "10.0.20348.230"
},
{
"model": "windows rt 8.1",
"scope": "eq",
"trust": 1.0,
"vendor": "microsoft",
"version": null
},
{
"model": "windows 10 1809",
"scope": "lt",
"trust": 1.0,
"vendor": "microsoft",
"version": "10.0.17763.2029"
},
{
"model": "windows 10 21h2",
"scope": "lt",
"trust": 1.0,
"vendor": "microsoft",
"version": "10.0.19044.1415"
},
{
"model": "windows 10 20h2",
"scope": "lt",
"trust": 1.0,
"vendor": "microsoft",
"version": "10.0.19042.1083"
},
{
"model": "windows 11 22h2",
"scope": "lt",
"trust": 1.0,
"vendor": "microsoft",
"version": "10.0.22621.674"
},
{
"model": "windows 10 22h2",
"scope": "lt",
"trust": 1.0,
"vendor": "microsoft",
"version": "10.0.19045.2251"
},
{
"model": "windows 11 21h2",
"scope": "lt",
"trust": 1.0,
"vendor": "microsoft",
"version": "10.0.22000.318"
},
{
"model": "windows server 2016",
"scope": "lt",
"trust": 1.0,
"vendor": "microsoft",
"version": "10.0.14393.4470"
},
{
"model": "windows server 20h2",
"scope": "lt",
"trust": 1.0,
"vendor": "microsoft",
"version": "10.0.19042.1083"
},
{
"model": "windows server 2012",
"scope": "eq",
"trust": 1.0,
"vendor": "microsoft",
"version": null
},
{
"model": "windows server 2012",
"scope": "eq",
"trust": 1.0,
"vendor": "microsoft",
"version": "r2"
},
{
"model": "windows server 2008",
"scope": "eq",
"trust": 1.0,
"vendor": "microsoft",
"version": null
},
{
"model": "windows 7",
"scope": "eq",
"trust": 1.0,
"vendor": "microsoft",
"version": null
},
{
"model": "windows server 2008",
"scope": "eq",
"trust": 1.0,
"vendor": "microsoft",
"version": "r2"
},
{
"model": "microsoft windows rt 8.1",
"scope": null,
"trust": 0.8,
"vendor": "\u30de\u30a4\u30af\u30ed\u30bd\u30d5\u30c8",
"version": null
},
{
"model": "microsoft windows server 2016",
"scope": null,
"trust": 0.8,
"vendor": "\u30de\u30a4\u30af\u30ed\u30bd\u30d5\u30c8",
"version": null
},
{
"model": "microsoft windows server 2012",
"scope": null,
"trust": 0.8,
"vendor": "\u30de\u30a4\u30af\u30ed\u30bd\u30d5\u30c8",
"version": null
},
{
"model": "microsoft windows server",
"scope": null,
"trust": 0.8,
"vendor": "\u30de\u30a4\u30af\u30ed\u30bd\u30d5\u30c8",
"version": null
},
{
"model": "microsoft windows 8.1",
"scope": null,
"trust": 0.8,
"vendor": "\u30de\u30a4\u30af\u30ed\u30bd\u30d5\u30c8",
"version": null
},
{
"model": "microsoft windows 7",
"scope": null,
"trust": 0.8,
"vendor": "\u30de\u30a4\u30af\u30ed\u30bd\u30d5\u30c8",
"version": null
},
{
"model": "microsoft windows 10",
"scope": null,
"trust": 0.8,
"vendor": "\u30de\u30a4\u30af\u30ed\u30bd\u30d5\u30c8",
"version": null
},
{
"model": "microsoft windows server 2008",
"scope": null,
"trust": 0.8,
"vendor": "\u30de\u30a4\u30af\u30ed\u30bd\u30d5\u30c8",
"version": null
},
{
"model": "microsoft windows server 2019",
"scope": null,
"trust": 0.8,
"vendor": "\u30de\u30a4\u30af\u30ed\u30bd\u30d5\u30c8",
"version": null
},
{
"model": "windows",
"scope": "eq",
"trust": 0.6,
"vendor": "microsoft",
"version": "7"
},
{
"model": "windows windows server",
"scope": "eq",
"trust": 0.6,
"vendor": "microsoft",
"version": "2012"
},
{
"model": "windows",
"scope": "eq",
"trust": 0.6,
"vendor": "microsoft",
"version": "8.1"
},
{
"model": "windows rt sp0",
"scope": "eq",
"trust": 0.6,
"vendor": "microsoft",
"version": "8.1"
},
{
"model": "windows",
"scope": "eq",
"trust": 0.6,
"vendor": "microsoft",
"version": "101607"
},
{
"model": "windows for 32-bit systems",
"scope": "eq",
"trust": 0.6,
"vendor": "microsoft",
"version": "10"
},
{
"model": "windows server",
"scope": "eq",
"trust": 0.6,
"vendor": "microsoft",
"version": "2012"
},
{
"model": "windows version for x64-based systems",
"scope": "eq",
"trust": 0.6,
"vendor": "microsoft",
"version": "101809"
},
{
"model": "windows version for arm64-based systems",
"scope": "eq",
"trust": 0.6,
"vendor": "microsoft",
"version": "101809"
},
{
"model": "windows version for 32-bit systems",
"scope": "eq",
"trust": 0.6,
"vendor": "microsoft",
"version": "101809"
},
{
"model": "windows",
"scope": "eq",
"trust": 0.6,
"vendor": "microsoft",
"version": "101909"
},
{
"model": "windows windows",
"scope": "eq",
"trust": 0.6,
"vendor": "microsoft",
"version": "101607"
},
{
"model": "windows server for x64-based systems servicepack",
"scope": "eq",
"trust": 0.6,
"vendor": "microsoft",
"version": "20082"
},
{
"model": "windows windows for x64-based systems",
"scope": "eq",
"trust": 0.6,
"vendor": "microsoft",
"version": "10"
},
{
"model": "windows server 20h2",
"scope": null,
"trust": 0.6,
"vendor": "microsoft",
"version": null
},
{
"model": "windows server",
"scope": "eq",
"trust": 0.6,
"vendor": "microsoft",
"version": "1909"
},
{
"model": "windows 20h2 for arm64-based systems",
"scope": "eq",
"trust": 0.6,
"vendor": "microsoft",
"version": "10"
},
{
"model": "windows 20h2 for 32-bit systems",
"scope": "eq",
"trust": 0.6,
"vendor": "microsoft",
"version": "10"
},
{
"model": "windows 20h2 for x64-based systems",
"scope": "eq",
"trust": 0.6,
"vendor": "microsoft",
"version": "10"
},
{
"model": "windows for x64-based systems",
"scope": "eq",
"trust": 0.6,
"vendor": "microsoft",
"version": "102004"
},
{
"model": "windows for arm64-based systems",
"scope": "eq",
"trust": 0.6,
"vendor": "microsoft",
"version": "102004"
},
{
"model": "windows for 32-bit systems",
"scope": "eq",
"trust": 0.6,
"vendor": "microsoft",
"version": "102004"
},
{
"model": "windows 21h1 for 32-bit systems",
"scope": "eq",
"trust": 0.6,
"vendor": "microsoft",
"version": "10"
},
{
"model": "windows 21h1 for arm64-b",
"scope": "eq",
"trust": 0.6,
"vendor": "microsoft",
"version": "10"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2021-48426"
},
{
"db": "JVNDB",
"id": "JVNDB-2021-001967"
},
{
"db": "NVD",
"id": "CVE-2021-34527"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "This document was written by Will Dormann.We have not received a
statement from the vendor.",
"sources": [
{
"db": "CERT/CC",
"id": "VU#383432"
}
],
"trust": 0.8
},
"cve": "CVE-2021-34527",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"author": "nvd@nist.gov",
"availabilityImpact": "COMPLETE",
"baseScore": 9.0,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 8.0,
"id": "CVE-2021-34527",
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"severity": "HIGH",
"trust": 1.1,
"vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "COMPLETE",
"baseScore": 10.0,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 10.0,
"id": "CNVD-2021-48426",
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"severity": "HIGH",
"trust": 0.6,
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"author": "nvd@nist.gov",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 2.8,
"id": "CVE-2021-34527",
"impactScore": 5.9,
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"trust": 2.0,
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
{
"attackComplexity": "Low",
"attackVector": "Network",
"author": "IPA",
"availabilityImpact": "High",
"baseScore": 8.8,
"baseSeverity": "High",
"confidentialityImpact": "High",
"exploitabilityScore": null,
"id": "JVNDB-2021-001967",
"impactScore": null,
"integrityImpact": "High",
"privilegesRequired": "Low",
"scope": "Unchanged",
"trust": 0.8,
"userInteraction": "None",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
}
],
"severity": [
{
"author": "nvd@nist.gov",
"id": "CVE-2021-34527",
"trust": 1.0,
"value": "HIGH"
},
{
"author": "secure@microsoft.com",
"id": "CVE-2021-34527",
"trust": 1.0,
"value": "HIGH"
},
{
"author": "IPA",
"id": "JVNDB-2021-001967",
"trust": 0.8,
"value": "High"
},
{
"author": "CNVD",
"id": "CNVD-2021-48426",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "CNNVD",
"id": "CNNVD-202107-137",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "CNNVD",
"id": "CNNVD-202104-975",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "VULMON",
"id": "CVE-2021-34527",
"trust": 0.1,
"value": "HIGH"
}
]
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2021-48426"
},
{
"db": "VULMON",
"id": "CVE-2021-34527"
},
{
"db": "JVNDB",
"id": "JVNDB-2021-001967"
},
{
"db": "CNNVD",
"id": "CNNVD-202107-137"
},
{
"db": "CNNVD",
"id": "CNNVD-202104-975"
},
{
"db": "NVD",
"id": "CVE-2021-34527"
},
{
"db": "NVD",
"id": "CVE-2021-34527"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "\u003cp\u003eA remote code execution vulnerability exists when the
Windows Print Spooler service improperly performs privileged file operations. An
attacker who successfully exploited this vulnerability could run arbitrary code
with SYSTEM privileges. An attacker could then install programs; view, change, or
delete data; or create new accounts with full user rights.\u003c/p\u003e\n\u003cp\
u003eUPDATE July 7, 2021: The security update for Windows Server 2012, Windows
Server 2016 and Windows 10, Version 1607 have been released. Please see the
Security Updates table for the applicable update for your system. We recommend that
you install these updates immediately. If you are unable to install these updates,
see the FAQ and Workaround sections in this CVE for information on how to help
protect your system from this vulnerability.\u003c/p\u003e\n\u003cp\u003eIn
addition to installing the updates, in order to secure your system, you must
confirm that the following registry settings are set to 0 (zero) or are not defined
(\u003cstrong\u003eNote\u003c/strong\u003e: These registry keys do not exist by
default, and therefore are already at the secure setting.), also that your Group
Policy setting are correct (see FAQ):\u003c/p\u003e\n\u003cul\u003e\n\u003cli\
u003eHKEY_LOCAL_MACHINE\\SOFTWARE\\Policies\\Microsoft\\Windows NT\\Printers\\
PointAndPrint\u003c/li\u003e\n\u003cli\u003eNoWarningNoElevationOnInstall = 0
(DWORD) or not defined (default setting)\u003c/li\u003e\n\u003cli\
u003eUpdatePromptSettings = 0 (DWORD) or not defined (default setting)\u003c/li\
u003e\n\u003c/ul\u003e\n\u003cp\u003e\u003cstrong\u003eHaving
NoWarningNoElevationOnInstall set to 1 makes your system vulnerable by design.\
u003c/strong\u003e\u003c/p\u003e\n\u003cp\u003eUPDATE July 6, 2021: Microsoft has
completed the investigation and has released security updates to address this
vulnerability. Please see the Security Updates table for the applicable update for
your system. We recommend that you install these updates immediately. If you are
unable to install these updates, see the FAQ and Workaround sections in this CVE
for information on how to help protect your system from this vulnerability. See
also \u003ca href=\"https://support.microsoft.com/topic/31b91c02-05bc-4ada-a7ea-
183b129578a7\"\u003eKB5005010: Restricting installation of new printer drivers
after applying the July 6, 2021 updates\u003c/a\u003e.\u003c/p\u003e\n\u003cp\
u003eNote that the security updates released on and after July 6, 2021 contain
protections for CVE-2021-1675 and the additional remote code execution exploit in
the Windows Print Spooler service known as \u201cPrintNightmare\u201d, documented
in CVE-2021-34527.\u003c/p\u003e\n. Print Spooler The service is a service for
realizing the waiting for printing in printing. RpcAddPrinterDriverEx() The
function is used by the above services to install the printer driver. Parameters
DRIVER_CONTAINER Objects and parameters dwFileCopyFlags Controls the printer driver
to be installed and how to copy files. If you are an authenticated user
RpcAddPrinterDriverEx() The function can be executed. Therefore, an attacker who
has obtained the authentication information can specify and install the driver on
the remote server.By an authenticated remote third party SYSTEM Arbitrary code can
be executed with privileges. Windows Print Spooler is a printer spooler for
Windows. \nMicrosoft Windows Print Spooler Components \u5b58\u5728\u5b89\u5168\
u6f0f\u6d1e\uff0c\u653b\u51fb\u8005\u53ef\u4ee5\u901a\u8fc7\u8be5\u6f0f\u6d1e\
u7ed5\u8fc7PfcAddPrinterDriver\u7684\u5b89\u5168\u9a8c\u8bc1\uff0c\u5e76\u5728\
u6253\u5370\u670d\u52a1\u5668\u4e2d\u5b89\u88c5\u6076\u610f\u7684\u9a71\u52a8\
u7a0b\u5e8f\u3002\u4ee5\u4e0b\u4ea7\u54c1\u548c\u7248\u672c\u53d7\u5230\u5f71\
u54cd\uff1aWindows 10 Version 1809 for 32-bit Systems,Windows 10 Version 1809 for
x64-based Systems,Windows 10 Version 1809 for ARM64-based Systems,Windows Server
2019,Windows Server 2019 (Server Core installation),Windows 10 Version 1909 for
32-bit Systems,Windows 10 Version 1909 for x64-based Systems,Windows 10 Version
1909 for ARM64-based Systems,Windows Server, version 1909 (Server Core
installation),Windows 10 Version 21H1 for x64-based Systems,Windows 10 Version 21H1
for ARM64-based Systems,Windows 10 Version 21H1 for 32-bit Systems,Windows 10
Version 2004 for 32-bit Systems,Windows 10 Version 2004 for ARM64-based
Systems,Windows 10 Version 2004 for x64-based Systems,Windows Server, version 2004
(Server Core installation),Windows 10 Version 20H2 for x64-based Systems,Windows 10
Version 20H2 for 32-bit Systems,Windows 10 Version 20H2 for ARM64-based
Systems,Windows Server, version 20H2 (Server Core Installation),Windows 10 for 32-
bit Systems,Windows 10 for x64-based Systems,Windows 10 Version 1607 for 32-bit
Systems,Windows 10 Version 1607 for x64-based Systems,Windows Server 2016,Windows
Server 2016 (Server Core installation),Windows 7 for 32-bit Systems Service Pack
1,Windows 7 for x64-based Systems Service Pack 1,Windows 8.1 for 32-bit
systems,Windows 8.1 for x64-based systems,Windows RT 8.1,Windows Server 2008 for
32-bit Systems Service Pack 2,Windows Server 2008 for 32-bit Systems Service Pack 2
(Server Core installation),Windows Server 2008 for x64-based Systems Service Pack
2,Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core
installation),Windows Server 2008 R2 for x64-based Systems Service Pack 1,Windows
Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core
installation),Windows Server 2012,Windows Server 2012 (Server Core
installation),Windows Server 2012 R2,Windows Server 2012 R2 (Server Core
installation). Pillow is a Python-based image processing library. \nThere is
currently no information about this vulnerability, please feel free to follow CNNVD
or manufacturer announcements",
"sources": [
{
"db": "NVD",
"id": "CVE-2021-34527"
},
{
"db": "CERT/CC",
"id": "VU#383432"
},
{
"db": "JVNDB",
"id": "JVNDB-2021-001967"
},
{
"db": "CNVD",
"id": "CNVD-2021-48426"
},
{
"db": "CNNVD",
"id": "CNNVD-202107-137"
},
{
"db": "CNNVD",
"id": "CNNVD-202104-975"
},
{
"db": "VULMON",
"id": "CVE-2021-34527"
}
],
"trust": 4.05
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2021-34527",
"trust": 3.9
},
{
"db": "CERT/CC",
"id": "VU#383432",
"trust": 2.2
},
{
"db": "PACKETSTORM",
"id": "167261",
"trust": 1.7
},
{
"db": "JVN",
"id": "JVNVU96262037",
"trust": 0.8
},
{
"db": "JVNDB",
"id": "JVNDB-2021-001967",
"trust": 0.8
},
{
"db": "CNVD",
"id": "CNVD-2021-48426",
"trust": 0.6
},
{
"db": "PACKETSTORM",
"id": "165024",
"trust": 0.6
},
{
"db": "CS-HELP",
"id": "SB2021070204",
"trust": 0.6
},
{
"db": "CXSECURITY",
"id": "WLB-2022050084",
"trust": 0.6
},
{
"db": "CNNVD",
"id": "CNNVD-202107-137",
"trust": 0.6
},
{
"db": "CS-HELP",
"id": "SB2021041363",
"trust": 0.6
},
{
"db": "CNNVD",
"id": "CNNVD-202104-975",
"trust": 0.6
},
{
"db": "VULMON",
"id": "CVE-2021-34527",
"trust": 0.1
}
],
"sources": [
{
"db": "CERT/CC",
"id": "VU#383432"
},
{
"db": "CNVD",
"id": "CNVD-2021-48426"
},
{
"db": "VULMON",
"id": "CVE-2021-34527"
},
{
"db": "JVNDB",
"id": "JVNDB-2021-001967"
},
{
"db": "CNNVD",
"id": "CNNVD-202107-137"
},
{
"db": "CNNVD",
"id": "CNNVD-202104-975"
},
{
"db": "NVD",
"id": "CVE-2021-34527"
}
]
},
"id": "VAR-202107-1010",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "CNVD",
"id": "CNVD-2021-48426"
}
],
"trust": 1.6
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"Network device"
],
"sub_category": null,
"trust": 0.6
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2021-48426"
}
]
},
"last_update_date": "2024-08-14T12:26:39.480000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "CVE-2021-34527\u00a0|\u00a0Windows\u00a0Print\u00a0Spooler\
u00a0Remote\u00a0Code\u00a0Execution\u00a0Vulnerability",
"trust": 0.8,
"url": "https://docs.microsoft.com/en-us/openspecs/windows_protocols/ms-
rprn/b96cc497-59e5-4510-ab04-5484993b259b"
},
{
"title": "Patch for Microsoft Windows Print Spooler code execution
vulnerability",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchInfo/show/277186"
},
{
"title": "Multiple Microsoft Product code injection vulnerability fixes",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=155832"
},
{
"title": "Check Point Security Alerts: Microsoft Windows Print Spooler
Remote Code Execution (CVE-2021-34527)",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?
qidtp=check_point_security_alerts\u0026qid=93893ce22c8de5424f0b5d48db7fc253"
},
{
"title": "CVE-2021-34527 - PrintNightmare LPE (PowerShell)",
"trust": 0.1,
"url": "https://github.com/JohnHammond/CVE-2021-34527 "
},
{
"title": "CVE-2021-34527 - PrintNightmare LPE (PowerShell)",
"trust": 0.1,
"url": "https://github.com/cyb3rpeace/CVE-2021-34527 "
},
{
"title": "https://github.com/hackerhouse-opensource/hackerhouse-
opensource",
"trust": 0.1,
"url": "https://github.com/hackerhouse-opensource/hackerhouse-opensource "
},
{
"title": "Welcome to our PrintNightmare exploit Capstone writeup. \nWhat
even is \"PrintNightmare\"? \nDetection\nDamage Control \u0026 the Recovery Process
Once a System has been Compromised \nMitigation and Isolation\nReproduction of the
exploit \nRelated Links",
"trust": 0.1,
"url": "https://github.com/crtaylor315/legendary-invention "
},
{
"title": "Welcome to our PrintNightmare exploit Capstone writeup. \nWhat
even is \"PrintNightmare\"? \nDetection\nDamage Control \u0026 the Recovery Process
Once a System has been Compromised \nMitigation and Isolation\nReproduction of the
exploit \nRelated Links",
"trust": 0.1,
"url": "https://github.com/crtaylor315/PrintNightmare-Before-Halloween "
},
{
"title": "CVE-2021-34527 - PrintNightmare LPE (PowerShell)",
"trust": 0.1,
"url": "https://github.com/sh7alward/CVE-20121-34527-nightmare "
},
{
"title": "CVE-2021-34527-1675",
"trust": 0.1,
"url": "https://github.com/CnOxx1/CVE-2021-34527-1675 "
},
{
"title": "PrintNightmare CVE-2021-34527",
"trust": 0.1,
"url": "https://github.com/powershellpr0mpt/PrintNightmare-CVE-2021-34527 "
},
{
"title": "HardeningKitty",
"trust": 0.1,
"url": "https://github.com/scipag/HardeningKitty "
},
{
"title": "Invoke-PrinterNightmareCheck",
"trust": 0.1,
"url": "https://github.com/WiredPulse/Invoke-PrinterNightmareResponse "
},
{
"title": "CVE-2021-34527",
"trust": 0.1,
"url": "https://github.com/hackerhouse-opensource/cve-2021-34527 "
},
{
"title": "It Was All A Dream\nWhy?\nAlternatives\nInstallation\nUsage\
nCredits",
"trust": 0.1,
"url": "https://github.com/byt3bl33d3r/ItWasAllADream "
},
{
"title": "https://github.com/CanaanGM/cap_ze_flag",
"trust": 0.1,
"url": "https://github.com/CanaanGM/cap_ze_flag "
},
{
"title": "CVE-2021-34527-PrintNightmare-Workaround",
"trust": 0.1,
"url": "https://github.com/geekbrett/CVE-2021-34527-PrintNightmare-
Workaround "
},
{
"title": "Powershell serviceflipper script for Spool service",
"trust": 0.1,
"url": "https://github.com/floridop/serviceflipper "
},
{
"title": "CVE-2021-34527 PrintNightmare PoC \ud83d\udc7e",
"trust": 0.1,
"url": "https://github.com/d0rb/CVE-2021-34527 "
},
{
"title": "PowerShell-Scripts",
"trust": 0.1,
"url": "https://github.com/secMK/PowerShell-Scripts "
},
{
"title": "HardeningKitty and Windows 10 Hardening",
"trust": 0.1,
"url": "https://github.com/0x6d69636b/windows_hardening "
},
{
"title": "HardeningKitty",
"trust": 0.1,
"url": "https://github.com/Alssi-consulting/HardeningKitty "
},
{
"title": "random-scripts",
"trust": 0.1,
"url": "https://github.com/romarroca/random-scripts "
},
{
"title": "disable-RegisterSpoolerRemoteRpcEndPoint",
"trust": 0.1,
"url": "https://github.com/rdboboia/disable-
RegisterSpoolerRemoteRpcEndPoint "
},
{
"title": "It Was All A Dream\nWhy?\nAlternatives\nInstallation\nUsage\
nCredits",
"trust": 0.1,
"url": "https://github.com/VK9D/PrintNightmare "
},
{
"title": "PrintNightmare (CVE-2021-34527)",
"trust": 0.1,
"url": "https://github.com/m8sec/CVE-2021-34527 "
},
{
"title": "PrintNightmare",
"trust": 0.1,
"url": "https://github.com/synth3sis/PrintNightmare "
},
{
"title": "CVE",
"trust": 0.1,
"url": "https://github.com/thangnguyenchien/CVE "
},
{
"title": "PrintNightmare",
"trust": 0.1,
"url": "https://github.com/Tomparte/PrintNightmare "
},
{
"title": "Printnightmare",
"trust": 0.1,
"url": "https://github.com/Eutectico/Printnightmare "
},
{
"title": "HardeningKitty and Windows 10 Hardening",
"trust": 0.1,
"url": "https://github.com/jcabrale/Windows_hardening "
},
{
"title": "Hacker Arsenal Tookit (HaRT)",
"trust": 0.1,
"url": "https://github.com/INIT6Source/Hacker-Arsenal-Toolkit "
},
{
"title": "Introduction\nInstallation\nUsage\nDependencies\nFeatures\nDoes
it require elevated privileges?\nReferences\nScreenshot",
"trust": 0.1,
"url": "https://github.com/0xIrison/PrintNightmare-Patcher "
},
{
"title": "PrintNightMareChecker\nScreenshot",
"trust": 0.1,
"url": "https://github.com/yyhh91/PrintNightMareChecker "
},
{
"title": "This is a scanner for the service Windows-Print-Spooler in risk\
nBased on CVE-2021-34527 PoC originally created by cube0x0",
"trust": 0.1,
"url": "https://github.com/dywhoami/CVE-2021-34527-Scanner-Based-On-
cube0x0-POC "
},
{
"title": "HardeningKitty",
"trust": 0.1,
"url": "https://github.com/AdamAmicro/CAHard "
},
{
"title": "Invoke-PSObfuscation",
"trust": 0.1,
"url": "https://github.com/gh0x0st/Invoke-PSObfuscation "
},
{
"title": "Offensive Cybersecurity Toolkit",
"trust": 0.1,
"url": "https://github.com/chdav/offensive-cybersec-toolkit "
},
{
"title": "PsFix-CVE-2021-34527",
"trust": 0.1,
"url": "https://github.com/fardinbarashi/PsFix-CVE-2021-34527 "
},
{
"title": "Introduction\nInstallation\nUsage\nDependencies\nFeatures\nDoes
it require elevated privileges?\nReferences\nScreenshot",
"trust": 0.1,
"url": "https://github.com/0xIrison/PrinterNightmare-Patcher "
},
{
"title": "Introduction\nInstallation\nUsage\nDependencies\nFeatures\nDoes
it require elevated privileges?\nReferences\nScreenshot",
"trust": 0.1,
"url": "https://github.com/0xirison/PrintNightmare-Patcher "
},
{
"title": "This is a scanner for the service Windows-Print-Spooler in risk\
nBased on CVE-2021-34527 PoC originally created by cube0x0",
"trust": 0.1,
"url": "https://github.com/dywhoami/CVE-2021-34527-Scanner-NOT-Poc-Based-
cube0x0 "
},
{
"title": "PowerShell\nAssign-CalendarPermission.ps1:\nClear-
ExternalDrive.ps1:\nConfirm-PrintNightmare.ps1:\nGet-MailboxReport.ps1:\nGet-
NetworkDriveReport.ps1:\nNew-JabberCSV.ps1:\nRemove-DeletedGroup.ps1:\
nCreateADUser:\nOneDrive:",
"trust": 0.1,
"url": "https://github.com/AdamPumphrey/PowerShell "
},
{
"title": "Disable-Spooler-Service-PrintNightmare-CVE-2021-34527",
"trust": 0.1,
"url": "https://github.com/vinaysudheer/Disable-Spooler-Service-
PrintNightmare-CVE-2021-34527 "
},
{
"title": "Trabalho_Grau_B",
"trust": 0.1,
"url": "https://github.com/RafaelwDuarte/Trabalho_Grau_B "
},
{
"title": "PowerShell\nAssign-CalendarPermission.ps1:\nClear-
ExternalDrive.ps1:\nConfirm-PrintNightmare.ps1:\nGet-MailboxReport.ps1:\nGet-
NetworkDriveReport.ps1:\nNew-JabberCSV.ps1:\nRemove-DeletedGroup.ps1:\
nCreateADUser:\nOneDrive:",
"trust": 0.1,
"url": "https://github.com/AdamPumphrey/Powershell "
},
{
"title": "CVE-2021-34527",
"trust": 0.1,
"url": "https://github.com/Amaranese/CVE-2021-34527 "
},
{
"title": "PowerShell-PrintNightmare",
"trust": 0.1,
"url": "https://github.com/syntaxbearror/PowerShell-PrintNightmare "
},
{
"title": "Invoke-PrinterNightmareCheck",
"trust": 0.1,
"url": "https://github.com/WiredPulse/Invoke-PrinterNightmareCheck "
},
{
"title": "HardeningKitty",
"trust": 0.1,
"url": "https://github.com/Gokul-C/CIS-Hardening-Windows-L1 "
},
{
"title": "printnightmare",
"trust": 0.1,
"url": "https://github.com/glorisonlai/printnightmare "
},
{
"title": "PrintNightmare-Windows Print Spooler RCE/LPE Vulnerability(CVE-
2021-34527, CVE-2021-1675)",
"trust": 0.1,
"url": "https://github.com/nathanealm/PrintNightmare-Exploit "
},
{
"title": "CVE-2021-1675 / CVE-2021-34527\nOfficial Guidance (Taken from
CVE-2021-34527",
"trust": 0.1,
"url": "https://github.com/DenizSe/CVE-2021-34527 "
},
{
"title": "PrintNightmare exploit",
"trust": 0.1,
"url": "https://github.com/outflanknl/PrintNightmare "
},
{
"title": "SpoolSploit\nDisclaimer\nCredits",
"trust": 0.1,
"url": "https://github.com/edsonjt81/SpoolSploit "
},
{
"title": "Local Privilege Escalation Edition of CVE-2021-1675/CVE-2021-
34527",
"trust": 0.1,
"url": "https://github.com/hlldz/CVE-2021-1675-LPE "
},
{
"title": "PrintNightmareCheck",
"trust": 0.1,
"url": "https://github.com/xbufu/PrintNightmareCheck "
},
{
"title": "CVE-2021-1675 / CVE-2021-34527",
"trust": 0.1,
"url": "https://github.com/cube0x0/CVE-2021-1675 "
},
{
"title": "SpoolSploit\nDisclaimer\nCredits",
"trust": 0.1,
"url": "https://github.com/BeetleChunks/SpoolSploit "
},
{
"title": "PowerSharpPack",
"trust": 0.1,
"url": "https://github.com/wowter-code/PowerSharpPack "
},
{
"title": "CVE-2021-1675 / CVE-2021-34527",
"trust": 0.1,
"url": "https://github.com/edsonjt81/CVE-2021-1675 "
},
{
"title": "microsoft-vulnerabilidades\nVulnerabilidade de execu\u00e7\u00e3o
remota de c\u00f3digo do Spooler de Impress\u00e3o do Windows\nCVE-2021-34527\
nSinopse\nHaving NoWarningNoElevationOnInstall definido como 1 torna seu sistema
vulner\u00e1vel por design.\nSolu\u00e7\u00f5es alternativas\nDeterminar se o
servi\u00e7o Spooler de Impress\u00e3o est\u00e1 em execu\u00e7\u00e3o\nOp\u00e7\
u00e3o 1 \u2014 Desabilitar o servi\u00e7o Spooler de Impress\u00e3o\nOp\u00e7\
u00e3o 2 \u2014 Desabilitar a impress\u00e3o remota de entrada por meio da Pol\
u00edtica de Grupo",
"trust": 0.1,
"url": "https://github.com/alvesnet-suporte/microsoft-vulnerabilidades "
},
{
"title": "CVE-2021-1675 / CVE-2021-34527\nOfficial Guidance (Taken from
CVE-2021-34527",
"trust": 0.1,
"url": "https://github.com/DenizSe/CVE-2021-1675 "
},
{
"title": "CVE-2021-1675 / CVE-2021-34527",
"trust": 0.1,
"url": "https://github.com/mtthwstffrd/cube0x0-CVE-2021-1675 "
},
{
"title": "CVE-2021-1675 / CVE-2021-34527",
"trust": 0.1,
"url": "https://github.com/auduongxuan/CVE-2022-26809 "
},
{
"title": "Windows Print Spooler Service RCE CVE-2021-1675 (PrintNightmare)\
nHow to disable the Print Spooler service ?\nCMD Shell\nPowerShell\nService
Control\nReferences",
"trust": 0.1,
"url": "https://github.com/ozergoker/PrintNightmare "
},
{
"title": "SpoolSploit\nDisclaimer\nCredits",
"trust": 0.1,
"url": "https://github.com/merlinepedra25/SpoolSploit "
},
{
"title": "PrintNightmare (CVE-2021-1675)",
"trust": 0.1,
"url": "https://github.com/corelight/CVE-2021-1675 "
},
{
"title": "SpoolSploit\nDisclaimer\nCredits",
"trust": 0.1,
"url": "https://github.com/YAHYA950/SpoolSploit "
},
{
"title": "CVE-2021-1675 / CVE-2021-34527",
"trust": 0.1,
"url": "https://github.com/galoget/PrintNightmare-CVE-2021-1675-CVE-2021-
34527 "
},
{
"title": "Sponsored by\nPowerSharpPack",
"trust": 0.1,
"url": "https://github.com/orgTestCodacy11KRepos110MB/repo-9265-
PowerSharpPack "
},
{
"title": "PrintNightmare",
"trust": 0.1,
"url": "https://github.com/ly4k/PrintNightmare "
},
{
"title": "Invoke-BuildAnonymousSMBServer",
"trust": 0.1,
"url": "https://github.com/3gstudent/Invoke-BuildAnonymousSMBServer "
},
{
"title": "PrintNightmare",
"trust": 0.1,
"url": "https://github.com/retr0-13/PrintNightmare "
},
{
"title": "awesome-c-sharp",
"trust": 0.1,
"url": "https://github.com/uhub/awesome-c-sharp "
},
{
"title": "PowerSharpPack",
"trust": 0.1,
"url": "https://github.com/merlinepedra25/POWERSHARPPACK "
},
{
"title": "PowerSharpPack",
"trust": 0.1,
"url": "https://github.com/merlinepedra/POWERSHARPPACK "
},
{
"title": "CNightmare - CVE-2021-1675 POC",
"trust": 0.1,
"url": "https://github.com/d0nkeyk0ng787/PrintNightmare-POC "
},
{
"title": "PrintNightmare - Windows Print Spooler RCE/LPE Vulnerability
(CVE-2021-34527, CVE-2021-1675)",
"trust": 0.1,
"url": "https://github.com/nemo-wq/CVE-2021-1675_CVE-2021-
34527_PrintNightmare "
},
{
"title": "CVE-2021-1675 / CVE-2021-34527\nOfficial Guidance (Taken from
CVE-2021-34527",
"trust": 0.1,
"url": "https://github.com/DenizSe/CVE-2020-1675 "
},
{
"title": "Print Nightmare \u5206\u6790\u62a5\u544a",
"trust": 0.1,
"url": "https://github.com/hahaleyile/my-CVE-2021-1675 "
},
{
"title": "From Lares Labs: Detection \u0026 Remediation Information for
CVE-2021-1675 \u0026 CVE-2021-34527\nFlow Chart\nWorkaround Fix\nSysmon Config
File\nSplunk Queries\nKQL Query for Sentinel / MDE via Olaf Hartong\nZeek
Observations\nCarbon Black Hunting Query for CVE-2021-1675\nReferences",
"trust": 0.1,
"url": "https://github.com/LaresLLC/CVE-2021-1675 "
},
{
"title": "SpoolSploit\nDisclaimer\nCredits",
"trust": 0.1,
"url": "https://github.com/merlinepedra/SpoolSploit "
},
{
"title": "Sponsored by\nPowerSharpPack",
"trust": 0.1,
"url": "https://github.com/oscpname/AD_PowerSharpPack "
},
{
"title": "cyber-ansible",
"trust": 0.1,
"url": "https://github.com/carloslacasa/cyber-ansible "
},
{
"title": "PrintNightmare\nCredits",
"trust": 0.1,
"url": "https://github.com/raithedavion/PrintNightmare "
},
{
"title": "CVE-2021-1675 / CVE-2021-34527",
"trust": 0.1,
"url": "https://github.com/eng-amarante/CyberSecurity "
},
{
"title": "Printnightmare Safe Tool",
"trust": 0.1,
"url": "https://github.com/SSBhaumik/Printnightmare-safetool "
},
{
"title": "https://github.com/p0haku/cve_scraper",
"trust": 0.1,
"url": "https://github.com/p0haku/cve_scraper "
},
{
"title": "Awesome Stars",
"trust": 0.1,
"url": "https://github.com/pluja/stars "
},
{
"title": "PrintNightmare",
"trust": 0.1,
"url": "https://github.com/ollypwn/PrintNightmare "
},
{
"title": "PrintNightmare - Windows Print Spooler RCE/LPE Vulnerability
(CVE-2021-34527, CVE-2021-1675)",
"trust": 0.1,
"url": "https://github.com/nemo-wq/PrintNightmare-CVE-2021-34527 "
},
{
"title": "TryHackMe | PrintNightmare",
"trust": 0.1,
"url": "https://github.com/r1skkam/PrintNightmare "
},
{
"title": "Sponsored by\nPowerSharpPack",
"trust": 0.1,
"url": "https://github.com/61106960/ClipySharpPack "
},
{
"title": "Sponsored by\nPowerSharpPack",
"trust": 0.1,
"url": "https://github.com/S3cur3Th1sSh1t/PowerSharpPack "
},
{
"title": "RedCsharp",
"trust": 0.1,
"url": "https://github.com/boh/RedCsharp "
},
{
"title": "CVE-2021-34527_mitigation",
"trust": 0.1,
"url": "https://github.com/WidespreadPandemic/CVE-2021-34527_ACL_mitigation
"
},
{
"title": "EVTX to MITRE Att@ck",
"trust": 0.1,
"url": "https://github.com/mdecrevoisier/EVTX-to-MITRE-Attack "
},
{
"title": "CVE-2021-34527_mitigation",
"trust": 0.1,
"url": "https://github.com/WidespreadPandemic/CVE-2021-34527_mitigation "
},
{
"title": "RDP Breaker Tool",
"trust": 0.1,
"url": "https://github.com/Royalboy2000/codeRDPbreaker "
},
{
"title": "https://github.com/glshnu/PrintNightmare",
"trust": 0.1,
"url": "https://github.com/glshnu/PrintNightmare "
},
{
"title": "SharpKatz",
"trust": 0.1,
"url": "https://github.com/b4rtik/SharpKatz "
},
{
"title": "INTRODUCTION TO ACTIVE DIRECTORY\nIntroduction to Active
Directory Enumeration \u0026 Attacks",
"trust": 0.1,
"url": "https://github.com/gecr07/HTB-Academy "
},
{
"title": "The Register",
"trust": 0.1,
"url":
"https://www.theregister.co.uk/2021/07/16/spooler_service_local_privilege_escalatio
n/"
},
{
"title": "The Register",
"trust": 0.1,
"url": "https://www.theregister.co.uk/2021/07/07/printnightmare_patched/"
},
{
"title": "The Register",
"trust": 0.1,
"url": "https://www.theregister.co.uk/2021/07/07/printnightmare_fix_fail/"
},
{
"title": "The Register",
"trust": 0.1,
"url": "https://www.theregister.co.uk/2021/07/02/printnightmare_cve/"
},
{
"title": "The Register",
"trust": 0.1,
"url": "https://www.theregister.co.uk/2022/03/16/russia-attack-ngo-mfa-
printnightmare/"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2021-48426"
},
{
"db": "VULMON",
"id": "CVE-2021-34527"
},
{
"db": "JVNDB",
"id": "JVNDB-2021-001967"
},
{
"db": "CNNVD",
"id": "CNNVD-202107-137"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-269",
"trust": 1.0
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-2021-34527"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 2.3,
"url":
"https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/cve-2021-34527"
},
{
"trust": 2.3,
"url": "http://packetstormsecurity.com/files/167261/print-spooler-remote-
dll-injection.html"
},
{
"trust": 0.8,
"url": "cve-2021-1675 "
},
{
"trust": 0.8,
"url": "cve-2021-34527 "
},
{
"trust": 0.8,
"url": "http://jvn.jp/cert/jvnvu96262037"
},
{
"trust": 0.8,
"url": "https://nvd.nist.gov/vuln/detail/cve-2021-34527"
},
{
"trust": 0.8,
"url": "https://www.ipa.go.jp/security/ciadr/vul/20210705-ms.html"
},
{
"trust": 0.8,
"url": "https://www.jpcert.or.jp/at/2021/at210029.html"
},
{
"trust": 0.8,
"url": "https://kb.cert.org/vuls/id/383432"
},
{
"trust": 0.8,
"url":
"https://us-cert.cisa.gov/ncas/current-activity/2021/06/30/printnightmare-critical-
windows-print-spooler-vulnerability"
},
{
"trust": 0.6,
"url": "https://www.kb.cert.org/vuls/id/383432"
},
{
"trust": 0.6,
"url": "https://www.cybersecurity-help.cz/vdb/sb2021070204"
},
{
"trust": 0.6,
"url": "https://cxsecurity.com/issue/wlb-2022050084"
},
{
"trust": 0.6,
"url": "https://packetstormsecurity.com/files/165024/printnightmare-
vulnerability.html"
},
{
"trust": 0.6,
"url": "https://msrc.microsoft.com/update-guide/vulnerability/cve-2021-
34527"
},
{
"trust": 0.6,
"url": "https://www.cybersecurity-help.cz/vdb/sb2021041363"
},
{
"trust": 0.1,
"url": "https://cwe.mitre.org/data/definitions/269.html"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov"
},
{
"trust": 0.1,
"url": "https://www.theregister.co.uk/2021/07/07/printnightmare_patched/"
},
{
"trust": 0.1,
"url": "https://github.com/hackerhouse-opensource/hackerhouse-opensource"
},
{
"trust": 0.1,
"url": "https://advisories.checkpoint.com/defense/advisories/public/2023/
cpai-2021-1666.html"
}
],
"sources": [
{
"db": "CERT/CC",
"id": "VU#383432"
},
{
"db": "CNVD",
"id": "CNVD-2021-48426"
},
{
"db": "VULMON",
"id": "CVE-2021-34527"
},
{
"db": "JVNDB",
"id": "JVNDB-2021-001967"
},
{
"db": "CNNVD",
"id": "CNNVD-202107-137"
},
{
"db": "CNNVD",
"id": "CNNVD-202104-975"
},
{
"db": "NVD",
"id": "CVE-2021-34527"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "CERT/CC",
"id": "VU#383432"
},
{
"db": "CNVD",
"id": "CNVD-2021-48426"
},
{
"db": "VULMON",
"id": "CVE-2021-34527"
},
{
"db": "JVNDB",
"id": "JVNDB-2021-001967"
},
{
"db": "CNNVD",
"id": "CNNVD-202107-137"
},
{
"db": "CNNVD",
"id": "CNNVD-202104-975"
},
{
"db": "NVD",
"id": "CVE-2021-34527"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2021-06-30T00:00:00",
"db": "CERT/CC",
"id": "VU#383432"
},
{
"date": "2021-07-07T00:00:00",
"db": "CNVD",
"id": "CNVD-2021-48426"
},
{
"date": "2021-07-02T00:00:00",
"db": "VULMON",
"id": "CVE-2021-34527"
},
{
"date": "2021-07-06T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2021-001967"
},
{
"date": "2021-07-01T00:00:00",
"db": "CNNVD",
"id": "CNNVD-202107-137"
},
{
"date": "2021-04-13T00:00:00",
"db": "CNNVD",
"id": "CNNVD-202104-975"
},
{
"date": "2021-07-02T22:15:08.757000",
"db": "NVD",
"id": "CVE-2021-34527"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2021-08-03T00:00:00",
"db": "CERT/CC",
"id": "VU#383432"
},
{
"date": "2021-07-07T00:00:00",
"db": "CNVD",
"id": "CNVD-2021-48426"
},
{
"date": "2024-02-02T00:00:00",
"db": "VULMON",
"id": "CVE-2021-34527"
},
{
"date": "2021-07-08T08:31:00",
"db": "JVNDB",
"id": "JVNDB-2021-001967"
},
{
"date": "2022-05-26T00:00:00",
"db": "CNNVD",
"id": "CNNVD-202107-137"
},
{
"date": "2021-04-14T00:00:00",
"db": "CNNVD",
"id": "CNNVD-202104-975"
},
{
"date": "2024-02-02T17:24:01.260000",
"db": "NVD",
"id": "CVE-2021-34527"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-202107-137"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Microsoft Windows Print Spooler allows for RCE via
AddPrinterDriverEx()",
"sources": [
{
"db": "CERT/CC",
"id": "VU#383432"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "other",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-202107-137"
},
{
"db": "CNNVD",
"id": "CNNVD-202104-975"
}
],
"trust": 1.2
}
}</pre>
</div>
</div>
</div>
</div>

<br />

</div>

<div class="tab-pane fade show" id="comments" role="tabpanel" aria-


labelledby="comments-tab">
<br />

<div class="row">
<div class="col">

<p><a href="/user/login">Log in</a> or <a href="/user/signup">create an


account</a> to share your comment.</p>

</div>
<div class="col text-end">
<a class="icon-link" href="/comments/feed.atom?vulnerability=CVE-2021-
34527" type="application/atom+xml" title="Atom feed">

<svg class="bi"
width="1em" height="1em" fill="currentColor">

<use xlink:href="/bootstrap/static/icons/bootstrap-icons.svg#rss"/>
</svg>
</a>
<a class="icon-link" href="/comments/feed.rss?vulnerability=CVE-2021-
34527" type="application/atom+xml" title="RSS feed">

<svg class="bi"
width="1em" height="1em" fill="currentColor">

<use xlink:href="/bootstrap/static/icons/bootstrap-icons.svg#rss-fill"/>
</svg>
</a>
</div>

</div>
<div class="collapse" id="newCommentCVE-2021-34527">
<div class="row">
<div class="col-md-9">
<div id="editor"></div>
</div>
<div class="col">
<br /><br /><br />
<div class="card card-body my-3">
<h5>Tags</h5>
<select class="form-multi-select" id="select-tags" size="9" multiple>
<optgroup label="Exploitability" exclusive="true">
<option
value="vulnerability:exploitability=industrialised">Industrialised</option>
<option
value="vulnerability:exploitability=customised">Customised</option>
<option
value="vulnerability:exploitability=documented">Documented</option>
<option
value="vulnerability:exploitability=theoretical">Theoretical</option>
</optgroup>
<optgroup label="Information" exclusive="false">
<option
value="vulnerability:information=PoC">Proof-of-Concept</option>
<option
value="vulnerability:information=remediation">Remediation</option>
<option
value="vulnerability:information=annotation">Annotation</option>
</optgroup>
</select>
<a href="https://www.misp-project.org/taxonomies.html#_vulnerability_3"
rel="noreferrer" target="_blank">Taxonomy of the tags.</a>
</div>
<button class='btn btn-primary' id='savecomment' title="Save the
comment">Save the comment</button>
</div>
</div>
</div>
<br /><br />
<div id="list-comments">
<div class="d-flex justify-content-center">
<div class="spinner-border" role="status"><span
class="sr-only">Loading…</span></div>
</div>
</div>
</div>

<div class="tab-pane fade show" id="bundles" role="tabpanel" aria-


labelledby="bundles-tab">
<br />
<div id="list-bundles">
<div class="d-flex justify-content-center">
<div class="spinner-border" role="status"><span
class="sr-only">Loading…</span></div>
</div>
</div>
</div>

<div class="tab-pane fade show" id="sightings" role="tabpanel" aria-


labelledby="sightings-tab">
<br />
<div class="row pb-3" id="sightings-pane-top">
<div class="col">
<a class="btn btn-primary" href="/sightings/?query=CVE-2021-34527">All
sightings related to this event</a>
<a class="btn btn-primary" href="/sightings/misp_export?vulnerability=CVE-
2021-34527">Export sightings related to this event</a>
</div>
</div>
<div id="chart-sightings">
<div class="d-flex justify-content-center">
<div class="spinner-border" role="status"><span
class="sr-only">Loading…</span></div>
</div>
</div>
<div id="sightingsChartContainer" class="chart-container pt-3">
<canvas id="sightingsChart" height="400"></canvas>
</div>
<div class="row">
<h3>Sightings</h3>
<div class="table-responsive">
<table class="table">
<thead>
<tr>
<th scope="col">Author</th>
<th scope="col">Source</th>
<th scope="col">Type</th>
<th scope="col">Date</th>
</tr>
</thead>
<tbody id="sighting-table-body"></tbody>
</table>
</div>
</div>
<div id="chart-detailed-legend" class="row">
<h3>Nomenclature</h3>
<div class="col-md-8">
<ul class="list-group list-group-flush">
<li class="list-group-item"><b>Seen</b>: The vulnerability was mentioned,
discussed, or seen somewhere by the user.</li>
<li class="list-group-item"><b>Confirmed</b>: The vulnerability is
confirmed from an analyst perspective.</li>
<li class="list-group-item"><b>Exploited</b>: This vulnerability was
exploited and seen by the user reporting the sighting.</li>
<li class="list-group-item"><b>Patched</b>: This vulnerability was
successfully patched by the user reporting the sighting.</li>
<li class="list-group-item"><b>Not exploited</b>: This vulnerability was
not exploited or seen by the user reporting the sighting.</li>
<li class="list-group-item"><b>Not confirmed</b>: The user expresses
doubt about the veracity of the vulnerability.</li>
<li class="list-group-item"><b>Not patched</b>: This vulnerability was
not successfully patched by the user reporting the sighting.</li>
</ul>
</div>
</div>
</div>

<div class="tab-pane fade show" id="sightingsCorrelations" role="tabpanel" aria-


labelledby="sightingsCorrelations-tab">
<br />
<div id="graph-container"></div>
</div>

</div>

<script>
let easyMDE = null;
let SCHEMA = null;
let COMMENTS = {};

function getSelectValues(select) {
var tags = [];
var options = select && select.options;
var opt;

for (var i=0, iLen=options.length; i<iLen; i++) {


opt = options[i];

if (opt.selected) {
if (opt.parentNode.getAttribute("exclusive") == "true") {
options1 = document.getElementById("select-tags").options;
for (var j=0, jLen=options1.length; j<jLen; j++) {
opt1 = options1[j];
if (opt1.parentNode.getAttribute("exclusive") == "true") {
opt1.selected = false;
}
}
opt.selected = true;
}
tags.push(opt.value || opt.text);
}
}
var json = jsoneditor.getValue();
if (!("meta" in json)) {
json["meta"] = [{"tags": tags}];
} else {
json["meta"].forEach(function(value, index, array) {
if ("tags" in value) {
obj = {"tags": tags}
json["meta"] = [];
json["meta"] = [obj];
}
})
}

jsoneditor.setValue(json);
}

document.getElementById("select-tags").onclick= function (e) {


getSelectValues(document.getElementById("select-tags"));
};

function formatNumberWithPrecision(value, precision) {


const formattedValue = parseFloat(value.toFixed(precision));
return formattedValue;
}

function RoundNumber(value) {
return Math.round(value);
}

document.addEventListener("DOMContentLoaded", function() {
// Enable tootips
var tooltipTriggerList = [].slice.call(document.querySelectorAll('[data-bs-
toggle="tooltip"]'))
var tooltipList = tooltipTriggerList.map(function (tooltipTriggerEl) {
return new bootstrap.Tooltip(tooltipTriggerEl)
})

// Pretty print of JSON data in JSON containers


var jsonContainers = document.querySelectorAll(".json-container");
Array.prototype.forEach.call(jsonContainers, function(jsonContainer) {
jsonContainer.innerHTML =
prettyPrintJson.toHtml(JSON.parse(jsonContainer.innerText));
});

// Open the tab specified with an anchor in the URL.


const hash = window.location.hash;
const tabButton = document.querySelector(`button[data-bs-target="${hash}"]`);
if (tabButton) {
const tab = new bootstrap.Tab(tabButton);
tab.show();
selected_tab = tabButton.getAttribute("id");
switch (selected_tab) {
case "comments-tab":
loadComments();
break;
case "bundles-tab":
loadBundles();
break;
case "sightings-tab":
loadSightings();
break;
case "sightingsCorrelations-tab":
loadSightingsCorrelations();
break;
default:
openTabById("#related");
break;
}
} else {
openTabById("#related");
}
// Update the URL when a tab is clicked, for consistent behavior
document.querySelectorAll('.nav-link[data-bs-toggle="tab"]').forEach(tabLink =>
{
tabLink.addEventListener("shown.bs.tab", function(event) {
history.replaceState(null, null, event.target.getAttribute("href"));
});
});

// Retrieve the JSON schema for the comment and initialize the editor.
fetch("/static/schemas/CIRCL/Security_Advisory_Comment.json")
.then(response => response.json())
.then(result => {
// initialize the JSON editor
SCHEMA = result;
initialize_editor(SCHEMA, {});
}).catch((error) => {
console.error('Error:', error);
});

// Retrieve the EPSS score


epss_score_elem = document.getElementById("epss-score");
if (epss_score_elem) {
fetch("/api/epss/CVE-2021-34527")
.then(response => response.json())
.then(result => {
if (result.total >= 1) {
document.getElementById("epss-
score").parentNode.parentNode.removeAttribute("hidden");
document.getElementById("epss-score").innerText = (result.data[0].epss *
100).toFixed(2) + "%";
document.getElementById("epss-percentile").innerText = "(" +
formatNumberWithPrecision(Number(result.data[0].percentile), 5) + ")";
} else {
document.getElementById("epss-score").parentNode.parentNode.remove();
}
}).catch((error) => {
console.error('Error:', error);
document.getElementById("epss-score").parentNode.parentNode.remove();
});
}
}) // End DOMContentLoaded listener

if (document.getElementById("deleteVulnerability")) {
document.getElementById("deleteVulnerability").onclick = function(event) {
if (!confirm('You are going to delete the vulnerability. Are you sure?')) {
return;
}
var csrf_token =
"Ijg5ZDVmZTZkNGQ2YmRhMWRhMmFlN2VkYzI5N2Q2MmM1OGVkNmNiNGUi.Z4uzvQ.ySEsrK_OK_0ksEh-
GjzZH7LzPvo";
fetch("/api/vulnerability/CVE-2021-34527", {
method: "DELETE",
headers: {
'Content-Type': 'application/json',
'X-CSRFToken': csrf_token
}
})
.then(response => {
if (!response.ok) {
console.log(response);
} else {
window.location="/recent";
}
})
.catch((error) => {
console.log(error);
});
};
}

function addSighting(originalEvent, source) {


const clickedItem = originalEvent.target;
var csrf_token =
"Ijg5ZDVmZTZkNGQ2YmRhMWRhMmFlN2VkYzI5N2Q2MmM1OGVkNmNiNGUi.Z4uzvQ.ySEsrK_OK_0ksEh-
GjzZH7LzPvo";
var json = {};
json["type"] = clickedItem.getAttribute("value");
json["vulnerability"] = "CVE-2021-34527";
json["source"] = source;
data = JSON.stringify(json);
fetch("/api/sighting/", {
method: "POST",
headers: {
'Content-Type': 'application/json',
'X-CSRFToken': csrf_token
},
body: data
})
.then(res => {
if (!res.ok) {
res.json().then(json => {
document.getElementById("modal-error-text").innerText = "Problem when
saving sighting.";
var modal = new bootstrap.Modal(document.getElementById('modalError'),
{});
modal.show();
});
} else {
loadSightings();
showToast("Success", "Sighting added successfully!");
openTabById("#sightings");
}
})
.catch((error) => {
console.log(error);
});
};

// Function to display the modal


function showModal(title, message, confirmCallback, event) {
// Get modal elements
const modal = new bootstrap.Modal(document.getElementById('sightingModal'));
const modalTitle = document.getElementById('sightingModalLabel');
const modalMessage = document.getElementById('modalMessage');
const confirmButton = document.getElementById('sightingModalConfirm');
const sourceInput = document.getElementById('sourceInput');

// Set modal title and body message


modalTitle.textContent = title;
modalMessage.textContent = message;

// Clear previous input value


sourceInput.value = '';

// Remove any previous click event to avoid duplication


confirmButton.replaceWith(confirmButton.cloneNode(true));

// Attach new event listener for confirmation button


document.getElementById('sightingModalConfirm').addEventListener('click', () => {
const source = sourceInput.value.trim();
confirmCallback(event, source); // Pass the source to the callback
modal.hide();
});

// Show the modal


modal.show();
}

// Attach click event listener to sightings list


const sightings_list = document.getElementById('sighting-list');
if (sightings_list) {
sightings_list.addEventListener('click', function (event) {
showModal(
'New Sighting',
'Are you sure you want to add this sighting?',
addSighting,
event
);
});
}

document.getElementById("savecomment").addEventListener("click", function(event)
{
var csrf_token =
"Ijg5ZDVmZTZkNGQ2YmRhMWRhMmFlN2VkYzI5N2Q2MmM1OGVkNmNiNGUi.Z4uzvQ.ySEsrK_OK_0ksEh-
GjzZH7LzPvo";
var json = jsoneditor.getValue();
json["description"] = easyMDE.value();
json["vulnerability"] = "CVE-2021-34527";
data = JSON.stringify(json);
fetch("/api/comment/", {
method: "POST",
headers: {
'Content-Type': 'application/json',
'X-CSRFToken': csrf_token
},
body: data
})
.then(res => {
if (!res.ok) {
res.json().then(json => {
document.getElementById("modal-error-text").innerText = json['message'];
var modal = new bootstrap.Modal(document.getElementById('modalError'),
{});
modal.show();
});
} else {
// reinitializes the form
window.jsoneditor.setValue({});
easyMDE.value("");
// collapse the view which is containing the form
new bootstrap.Collapse(document.getElementById("newCommentCVE-2021-
34527"));
// load the updated list of comments
loadComments();
showToast("Success", "Comment added successfully!");
}
})
.catch((error) => {
console.log(error);
});
});

function copyToClipboard(vuln_id) {
const copyText = document.getElementById("container"+vuln_id).textContent;
const textArea = document.createElement('textarea');
textArea.textContent = copyText;
navigator.clipboard.writeText(textArea.value).then(function() {
/* clipboard successfully set */
showToast("Success", "Content copied to your clipboard.");
}, function() {
/* clipboard write failed */
});
}

function loadComments() {
COMMENTS = {};
var DateTime = luxon.DateTime;
var converter = new showdown.Converter({tables: true, moreStyling: true});
var commentTemplate = _.template(
'<div class="card markdown-description">' +
'<div class="card-body">' +
'<h5 class="card-title"><a href="/comment/<%= uuid %>"><%= title
%></a></h5>' +
'<p class="card-title">' +
'<% _.forEach(tags, function(tag) ' +
'{ %><span class="badge bg-primary"><a class="link-light"
href="/comments/?meta=%5B%7B%22tags%22%3A%20%5B%22<%= tag %>%22%5D%7D%5D"><%= tag
%></a></span> <% }); %>' +
'</p>' +
'<h6 class="card-subtitle mb-2 text-body-secondary"><%= timestamp %> by <a
href="/user/<%= author_login %>"><%= author_name %></a></h6>' +
'<p class="card-text"><%= description %></p>' +
'<div class="btn-group" role="group">' +
'<a role="button" class="btn btn-primary" data-bs-toggle="collapse" data-
bs-target="#collapseJsonComment<%= uuid %>" aria-expanded="false" aria-
controls="collapseJsonComment<%= uuid %>">JSON</a>' +
'</div>' +
'<div class="collapse" id="collapseJsonComment<%= uuid %>"><br /><pre
class="json-container"><%= comment %></pre></div>' +
'</div></div>'
);
fetch("/api/comment/?vuln_id=CVE-2021-34527")
.then(response => response.json())
.then(result => {
document.getElementById("list-comments").innerHTML = "";
document.getElementById("nb-comments").innerText = result.metadata.count;
if (result.metadata.count == 0) {
document.getElementById("list-comments").innerHTML = "<p>No comment for
this vulnerability. Browse <a href='/comments'>all the comments</a>.</p>";
}
result.data
.sort(function (a, b) {
return new Date(b.timestamp) - new Date(a.timestamp);
})
.map(function (comment) {
var author = comment.author
delete comment.author;
if (Array.isArray(comment["meta"]) && comment["meta"].length > 0) {
var itemWithTags = comment.meta.find(item => item.tags);
var tags = itemWithTags ? itemWithTags.tags : [];
} else {
var tags = [];
}
var cardHTML = commentTemplate({
'comment': JSON.stringify(comment, null, 2),
'uuid': comment.uuid,
'title': comment.title,
'description': converter.makeHtml(comment.description),
'timestamp': DateTime.fromISO(comment.timestamp).toRelative(),
'author_name': author.name,
'author_login': author.login,
'tags': tags
});
COMMENTS[comment.uuid] = comment;
var element = document.createElement("div");
var element_br = document.createElement("br");
element.innerHTML = cardHTML;
document.getElementById("list-comments").appendChild(element.firstChild);
document.getElementById("list-comments").append(element_br);
})
})
.then(_ => {
setTimeout(() => {
formatMarkdownOutput();

if (easyMDE === null) {


easyMDE = new EasyMDE({
element: document.getElementById('root[description]'),
autoRefresh: { delay: 300 },
toolbarButtonClassPrefix: "mde",
toolbar: [
"bold", "italic", "heading", "|", "quote", "code", "table",
"unordered-list", "ordered-list", "|", "link", "image", "|", "preview", "side-by-
side", "fullscreen", "|"
]
});
}
}, 0); // 0ms delay still allows the browser to update the DOM
return COMMENTS;
})
.catch((error) => {
console.error('Error:', error);
});

function initialize_editor(schema, json_object) {


// Default starting schema
if(!schema) {
schema = {}
}

// Divs/textareas on the page


var $schema = schema;
var $output = document.getElementById('output');
var $editor = document.getElementById('editor');

// Default theme
JSONEditor.defaults.options.theme = 'bootstrap5';

window.startval = json_object;

var jsoneditor;

var reload = function(keep_value) {


var startval = (jsoneditor && keep_value)? jsoneditor.getValue() :
window.startval;
window.startval = undefined;

if (jsoneditor) {
jsoneditor.destroy();
}
jsoneditor = new JSONEditor($editor, {
// The schema for the editor
schema: schema,
// Remove collapse button
disable_collapse: true,
// Seed the form with a starting value
startval: startval,
// Enable fetching schemas via ajax
ajax: true,
// Disable additional properties
no_additional_properties: false,
// Require all properties by default
required_by_default: true,
show_opt_in: false,
disable_edit_json: true,
theme: "bootstrap5",
object_background: document.documentElement.getAttribute("data-bs-theme")
== "dark" ? "bg-dark" : "bg-light",
});
window.jsoneditor = jsoneditor;

// When the value of the editor changes, update the JSON output and
validation message
jsoneditor.on('change',function() {
var json = jsoneditor.getValue();
});
};
// Start the schema and output textareas with initial values
$schema.value = JSON.stringify(schema, null, 2);
reload();
};

function loadBundles() {
var DateTime = luxon.DateTime;
var converter = new showdown.Converter({tables: true, moreStyling: true});
var bundleTemplate = _.template(
'<div class="card markdown-description">' +
'<div class="card-body">' +
'<h5 class="card-title"><a href="/bundle/<%= uuid %>"><%= name %></a></h5>'
+
'<h6 class="card-subtitle mb-2 text-body-secondary"><%= timestamp %> by <a
href="/user/<%= author_login %>"><%= author_name %></a></h6>' +
'<p class="card-text"><%= description %></p>' +
'<h5 class="card-text">Related vulnerabilities</h5>' +
'<div class="card" >' +
'<ul class="list-group list-group-flush">' +
'<% _.forEach(related_vulnerabilities, function(vuln) ' +
'{ %><li class="list-group-item"><a href="/vuln/<%= vuln %>"><%- vuln
%></a></li><% }); %>' +
'</ul>' +
'</div>' +
'</div>');
fetch("/api/bundle/?vuln_id=CVE-2021-34527")
.then(response => response.json())
.then(result => {
document.getElementById("list-bundles").innerHTML = "<p>Bundles referring to
this vulnerability.</p>";
if (result.metadata.count == 0) {
document.getElementById("list-bundles").innerHTML = "<p>This vulnerability
is not linked to any bundle.</p>";
}
result.data
.sort(function (a, b) {
return new Date(b.updated_at) - new Date(a.updated_at);
})
.map(function (bundle) {
var author = bundle.author
delete bundle.author;
var cardHTML = bundleTemplate({
'uuid': bundle.uuid,
'name': bundle.name,
'description': converter.makeHtml(bundle.description),
'timestamp': DateTime.fromISO(bundle.timestamp).toRelative(),
'related_vulnerabilities': bundle.related_vulnerabilities.map(v =>
v.toLowerCase()),
'author_name': author.name,
'author_login': author.login
});
var element = document.createElement("div");
var element_br = document.createElement("br");
element.innerHTML = cardHTML;
document.getElementById("list-bundles").appendChild(element.firstChild);
document.getElementById("list-bundles").append(element_br);
})
})
.then(_ => {
setTimeout(() => {
formatMarkdownOutput();
}, 0); // 0ms delay still allows the browser to update the DOM
})
.catch((error) => {
console.error('Error:', error);
});
};

function loadSightings() {
fetch("/api/sighting/?vuln_id=CVE-2021-34527&date_from=1970-01-01")
.then(response => response.json())
.then(result => {
document.getElementById("nb-sightings").innerText = result.metadata.count;
if (result.metadata.count == 0) {
document.getElementById("sightings-pane-top").style.display = 'none';
document.getElementById("chart-sightings").innerHTML = "<p>No sightings
for this vulnerability.</p>";
document.getElementById("sightingsChartContainer").style.display =
'none';
document.getElementById("chart-detailed-legend").style.display = 'none';
} else{
drawBarChart(result.data);
document.getElementById("sightings-pane-top").style.display = 'block';
document.getElementById("chart-sightings").innerHTML = "<h3>Evolution of
sightings over time</h3>";
document.getElementById("sightingsChartContainer").style.display = 'block';
document.getElementById("chart-detailed-legend").style.display = 'block';

// clear the table


const tableBody = document.getElementById("sighting-table-body");
while (tableBody.firstChild) {
tableBody.removeChild(tableBody.firstChild);
}

result.data
.sort(function (a, b) {
return new Date(b.creation_timestamp) - new Date(a.creation_timestamp);
})
.map(function (sighting) {
const row = document.createElement('tr'); // Create a table row

// Create and append the Author cell


const authorCell = document.createElement('td');
// authorCell.textContent = sighting.author.login;
authorCell.innerHTML = '<a
href="/user/'+sighting.author.login+'">'+sighting.author.login+'</a>';
row.appendChild(authorCell);

// Create and append the Source cell


const sourceCell = document.createElement('td');
if (isValidURL(sighting.source)) {
sourceCell.innerHTML = '<a href="'+sighting.source+'" rel="noreferrer"
target="_blank">'+sighting.source+'</a> (<a
href="/sighting/'+sighting.uuid+'/correlations">correlations</a>)';
} else {
sourceCell.innerHTML = sighting.source+' (<a
href="/sighting/'+sighting.uuid+'/correlations">correlations</a>)';
}
row.appendChild(sourceCell);

// Create and append the Type cell


const typeCell = document.createElement('td');
typeCell.textContent = sighting.type;
row.appendChild(typeCell);

// Create and append the Date cell


const dateCell = document.createElement('td');
dateCell.classList.add('datetime');
dateCell.textContent = sighting.creation_timestamp;
dateCell.title = sighting.creation_timestamp;
row.appendChild(dateCell);

document.getElementById("sighting-table-body").appendChild(row);
})

var DateTime = luxon.DateTime;


elements = document.getElementsByClassName("datetime");
Array.prototype.forEach.call(elements, function(element) {
element.textContent = DateTime.fromISO(element.textContent).toRelative()
});

}
})
.catch((error) => {
console.error('Error:', error);
});
};

function loadSightingsCorrelations() {
// Clear any existing graph in the container
d3.select("#graph-container").selectAll("svg").remove();
d3.select("#graph-container").selectAll(".zoom-controls").remove();

// Fetch data from API and create the graph


fetch("/api/sighting/?vuln_id=CVE-2021-34527&date_from=1970-01-01", {
method: 'GET',
headers: {
'Accept': 'application/json'
}
})
.then(response => response.json())
.then(apiData => {
// Extract the central node (vulnerability ID) and sightings
const centralNode = "CVE-2021-34527".toUpperCase(); // Convert to uppercase
const nodes = [{ id: centralNode, group: 1 }];
const links = [];

// Add initial group 2 nodes and links


apiData.data.forEach((entry) => {
const sighting_source = entry.source || `no-source-${entry.uuid}`;
if (!nodes.some(node => node.id === sighting_source)) {
nodes.push({ id: sighting_source, group: 2 });
}
links.push({ source: sighting_source, target: centralNode });
});

const width = document.getElementById("graph-container").offsetWidth;


const height = document.getElementById("graph-container").offsetHeight || 600;

const svg = d3
.select("#graph-container")
.append("svg")
.attr("width", width)
.attr("height", height);

const svgGroup = svg.append("g");

svg.append("defs").append("marker")
.attr("id", "arrow")
.attr("viewBox", "0 -5 10 10")
.attr("refX", 22)
.attr("refY", 0)
.attr("markerWidth", 6)
.attr("markerHeight", 6)
.attr("orient", "auto")
.append("path")
.attr("d", "M0,-5L10,0L0,5")
.attr("fill", "#999");

const simulation = d3
.forceSimulation(nodes)
.force("link", d3.forceLink(links).id(d => d.id).distance(100))
.force("charge", d3.forceManyBody().strength(-300))
.force("center", d3.forceCenter(width / 2, height / 2));

const linkGroup = svgGroup.append("g").attr("class", "links");


const nodeGroup = svgGroup.append("g").attr("class", "nodes");
const labelGroup = svgGroup.append("g").attr("class", "labels");

function updateGraph() {
// Bind data for links
const link = linkGroup
.selectAll("line")
.data(links, d => `${d.source.id || d.source}-${d.target.id || d.target}`);

link.enter()
.append("line")
.attr("stroke-width", 2)
.attr("stroke", "#999")
.attr("marker-end", "url(#arrow)")
.merge(link)
.attr("x1", d => d.source.x)
.attr("y1", d => d.source.y)
.attr("x2", d => d.target.x)
.attr("y2", d => d.target.y);

// Bind data for nodes


const node = nodeGroup
.selectAll("circle")
.data(nodes, d => d.id);

node.enter()
.append("circle")
.attr("r", d => d.group === 1 ? 15 : 10) // Larger size for central node
.attr("fill", d => d.group === 2 ? "#4caf50" : "#ff0000")
.attr("stroke", d => d.group === 1 ? "#000000" : "none") // Border for
central node
.attr("stroke-width", d => d.group === 1 ? 2 : 0) // Border width for
central node
.on("mouseover", function (event, d) {
d3.select(this).attr("fill", "#446d80");
})
.on("mouseout", function (event, d) {
d3.select(this).attr("fill", d => d.group === 2 ? "#4caf50" : "#ff0000");
})
.on("dblclick", function (event, d) {
if (d.group === 3) {
window.location.href = `/vuln/${d.id}`;
}
})
.call(
d3.drag()
.on("start", (event, d) => {
if (!event.active) simulation.alphaTarget(0.3).restart();
d.fx = d.x;
d.fy = d.y;
})
.on("drag", (event, d) => {
d.fx = event.x;
d.fy = event.y;
})
.on("end", (event, d) => {
if (!event.active) simulation.alphaTarget(0);
d.fx = null;
d.fy = null;
})
)
.merge(node)
.attr("cx", d => d.x)
.attr("cy", d => d.y);

// Bind data for labels


const label = labelGroup
.selectAll("text")
.data(nodes, d => d.id);

label.enter()
.append("a")
.attr("xlink:href", d => (d.id.startsWith("http") ? d.id : null)) // Make
label clickable if URL
.attr("target", "_blank") // Open link in new tab
.append("text")
.text(d => (d.group === 1 || d.group === 3) ? d.id : (d.group === 2 ?
d.id : ""))
.attr("font-size", 12)
.attr("dx", 18)
.attr("dy", 4)
.merge(label)
.attr("x", d => d.x)
.attr("y", d => d.y);

// Restart simulation
simulation.nodes(nodes);
simulation.force("link").links(links);
simulation.alpha(1).restart();
}

// Add zoom in and zoom out buttons


const zoom = d3.zoom().on("zoom", (event) => {
svgGroup.attr("transform", event.transform);
});

svg.call(zoom);

const zoomControls = d3.select("#graph-container")


.append("div")
.attr("class", "zoom-controls")
.style("position", "relative")
.style("top", "10px")
.style("right", "10px");

zoomControls.append("button")
.attr("class", "btn btn-primary m-1 mb-2")
.text("+")
.on("click", () => {
svg.transition().call(zoom.scaleBy, 1.2);
});

zoomControls.append("button")
.attr("class", "btn btn-primary m-1 mb-2")
.text("-")
.on("click", () => {
svg.transition().call(zoom.scaleBy, 0.8);
});

// Automatically fetch vulnerabilities for all group 2 nodes


const group2Nodes = nodes.filter(node => node.group === 2);

group2Nodes.forEach(node => {
fetch(`/api/sighting?source=${encodeURIComponent(node.id)}`, {
method: 'GET',
headers: { 'Accept': 'application/json' }
})
.then(response => response.json())
.then(expandData => {
expandData.data.forEach((entry) => {
const vuln = entry.vulnerability.toUpperCase(); // Convert to uppercase
if (vuln !== centralNode && !nodes.some(n => n.id === vuln)) {
const newNode = { id: vuln, group: 3 };
nodes.push(newNode);
links.push({ source: node, target: newNode }); // Use node object as
source
}
});
updateGraph();
})
.catch(error => console.error('Error fetching vulnerabilities:', error));
});

simulation.on("tick", () => {
linkGroup.selectAll("line")
.attr("x1", d => d.source.x)
.attr("y1", d => d.source.y)
.attr("x2", d => d.target.x)
.attr("y2", d => d.target.y);

nodeGroup.selectAll("circle")
.attr("cx", d => d.x)
.attr("cy", d => d.y);

labelGroup.selectAll("text,a")
.attr("x", d => d.x)
.attr("y", d => d.y);
});

updateGraph();
})
.catch(error => console.error('Error fetching initial data:', error));
}

document.getElementById("btnThemeSwitch").addEventListener("click",()=>{
if (document.documentElement.getAttribute("data-bs-theme") == "dark") {
Array.from(document.getElementsByClassName("card")).forEach(container => {
container.classList.remove("bg-dark");
container.classList.add("bg-light");
});
} else {
Array.from(document.getElementsByClassName("card")).forEach(container => {
container.classList.remove("bg-light");
container.classList.add("bg-dark");
});
}
})
</script>

</div>
</main>

<footer class="footer bg-light">


<div class="container">
<div class="row">
<div class="col d-none d-md-block">
<div class="d-flex justify-content-start">
<span class="text-muted"><a href="https://www.circl.lu"
rel="noreferrer" target="_blank">Computer Incident Response Center Luxembourg
(CIRCL)</a></span>
</div>
</div>
<div class="col">
<div class="d-flex justify-content-end">
<a class="text-end d-none d-md-block"
href="https://vulnerability.circl.lu/dumps/">Dumps</a>&nbsp;&nbsp;

<a class="text-end" href="/users/">Contributors</a>&nbsp;&nbsp;

<a class="text-end"
href="/documentation/">Documentation</a>&nbsp;&nbsp;
<a class="text-end" href="/api/">API</a>&nbsp;&nbsp;
<a class="text-end" href="/about">About</a>&nbsp;&nbsp;
<a class="text-end"
href="https://github.com/cve-search/vulnerability-lookup" title="Source code of
Vulnerability-Lookup" target="_blank">

<svg class="bi"
width="1em" height="1em" fill="currentColor">

<use xlink:href="/bootstrap/static/icons/bootstrap-icons.svg#github"/>
</svg>
</a>
</div>
</div>
</div>
</div>
</footer>

<!-- Optional JavaScript -->


<script src="/bootstrap/static/umd/popper.min.js"></script>
<script src="/bootstrap/static/js/bootstrap.min.js"></script>

<script>
if (getCookie("theme") == 'light') {
document.getElementById('btnThemeSwitch').innerHTML = '<svg
xmlns="http://www.w3.org/2000/svg" width="16" height="16" fill="currentColor"
class="bi bi-moon-stars-fill" viewBox="0 0 16 16"><path d="M6 .278a.77.77 0 0
1 .08.858 7.2 7.2 0 0 0-.878 3.46c0 4.021 3.278 7.277 7.318 7.277q.792-.001
1.533-.16a.79.79 0 0 1 .81.316.73.73 0 0 1-.031.893A8.35 8.35 0 0 1 8.344 16C3.734
16 0 12.286 0 7.71 0 4.266 2.114 1.312 5.124.06A.75.75 0 0 1 6 .278"/><path
d="M10.794 3.148a.217.217 0 0 1 .412 0l.387 1.162c.173.518.579.924 1.097
1.097l1.162.387a.217.217 0 0 1 0 .412l-1.162.387a1.73 1.73 0 0 0-1.097 1.097l-.387
1.162a.217.217 0 0 1-.412 0l-.387-1.162A1.73 1.73 0 0 0 9.31 6.593l-
1.162-.387a.217.217 0 0 1 0-.412l1.162-.387a1.73 1.73 0 0 0 1.097-
1.097zM13.863.099a.145.145 0 0 1 .274
0l.258.774c.115.346.386.617.732.732l.774.258a.145.145 0 0 1 0 .274l-.774.258a1.16
1.16 0 0 0-.732.732l-.258.774a.145.145 0 0 1-.274 0l-.258-.774a1.16 1.16 0 0
0-.732-.732l-.774-.258a.145.145 0 0 1
0-.274l.774-.258c.346-.115.617-.386.732-.732z"/></svg>';
document.getElementById('vulnerability-lookup-logo').src = '/static/img/VL-
hori-coul.png';
document.getElementById('btnThemeSwitch').setAttribute('title', 'Switch to
dark theme');
} else {
document.getElementById('btnThemeSwitch').innerHTML = '<svg
xmlns="http://www.w3.org/2000/svg" width="16" height="16" fill="currentColor"
class="bi bi-sun-fill" viewBox="0 0 16 16"><path d="M8 12a4 4 0 1 0 0-8 4 4 0 0 0 0
8M8 0a.5.5 0 0 1 .5.5v2a.5.5 0 0 1-1 0v-2A.5.5 0 0 1 8 0m0 13a.5.5 0 0
1 .5.5v2a.5.5 0 0 1-1 0v-2A.5.5 0 0 1 8 13m8-5a.5.5 0 0 1-.5.5h-2a.5.5 0 0 1 0-
1h2a.5.5 0 0 1 .5.5M3 8a.5.5 0 0 1-.5.5h-2a.5.5 0 0 1 0-1h2A.5.5 0 0 1 3 8m10.657-
5.657a.5.5 0 0 1 0 .707l-1.414 1.415a.5.5 0 1 1-.707-.708l1.414-1.414a.5.5 0 0
1 .707 0m-9.193 9.193a.5.5 0 0 1 0 .707L3.05 13.657a.5.5 0 0 1-.707-.707l1.414-
1.414a.5.5 0 0 1 .707 0m9.193 2.121a.5.5 0 0 1-.707 0l-1.414-1.414a.5.5 0 0
1 .707-.707l1.414 1.414a.5.5 0 0 1 0 .707M4.464 4.465a.5.5 0 0 1-.707 0L2.343
3.05a.5.5 0 1 1 .707-.707l1.414 1.414a.5.5 0 0 1 0 .708"/></svg>';
document.getElementById('vulnerability-lookup-logo').src = '/static/img/VL-
hori-white-coul.png';
document.getElementById('btnThemeSwitch').setAttribute('title', 'Switch to
light theme');
}
document.addEventListener("DOMContentLoaded", function() {
document.getElementById('btnThemeSwitch').addEventListener('click',()=>{
if (document.documentElement.getAttribute('data-bs-theme') == 'dark') {
document.documentElement.setAttribute('data-bs-theme','light')
document.getElementById('btnThemeSwitch').innerHTML = '<svg
xmlns="http://www.w3.org/2000/svg" width="16" height="16" fill="currentColor"
class="bi bi-moon-stars-fill" viewBox="0 0 16 16"><path d="M6 .278a.77.77 0 0
1 .08.858 7.2 7.2 0 0 0-.878 3.46c0 4.021 3.278 7.277 7.318 7.277q.792-.001
1.533-.16a.79.79 0 0 1 .81.316.73.73 0 0 1-.031.893A8.35 8.35 0 0 1 8.344 16C3.734
16 0 12.286 0 7.71 0 4.266 2.114 1.312 5.124.06A.75.75 0 0 1 6 .278"/><path
d="M10.794 3.148a.217.217 0 0 1 .412 0l.387 1.162c.173.518.579.924 1.097
1.097l1.162.387a.217.217 0 0 1 0 .412l-1.162.387a1.73 1.73 0 0 0-1.097 1.097l-.387
1.162a.217.217 0 0 1-.412 0l-.387-1.162A1.73 1.73 0 0 0 9.31 6.593l-
1.162-.387a.217.217 0 0 1 0-.412l1.162-.387a1.73 1.73 0 0 0 1.097-
1.097zM13.863.099a.145.145 0 0 1 .274
0l.258.774c.115.346.386.617.732.732l.774.258a.145.145 0 0 1 0 .274l-.774.258a1.16
1.16 0 0 0-.732.732l-.258.774a.145.145 0 0 1-.274 0l-.258-.774a1.16 1.16 0 0
0-.732-.732l-.774-.258a.145.145 0 0 1
0-.274l.774-.258c.346-.115.617-.386.732-.732z"/></svg>';
document.getElementById('vulnerability-lookup-logo').src =
'/static/img/VL-hori-coul.png';
document.getElementById('btnThemeSwitch').setAttribute('title', 'Switch
to dark theme');
document.cookie = "theme=light; path=/; SameSite=Strict";
}
else {
document.documentElement.setAttribute('data-bs-theme','dark');
document.getElementById('btnThemeSwitch').innerHTML = '<svg
xmlns="http://www.w3.org/2000/svg" width="16" height="16" fill="currentColor"
class="bi bi-sun-fill" viewBox="0 0 16 16"><path d="M8 12a4 4 0 1 0 0-8 4 4 0 0 0 0
8M8 0a.5.5 0 0 1 .5.5v2a.5.5 0 0 1-1 0v-2A.5.5 0 0 1 8 0m0 13a.5.5 0 0
1 .5.5v2a.5.5 0 0 1-1 0v-2A.5.5 0 0 1 8 13m8-5a.5.5 0 0 1-.5.5h-2a.5.5 0 0 1 0-
1h2a.5.5 0 0 1 .5.5M3 8a.5.5 0 0 1-.5.5h-2a.5.5 0 0 1 0-1h2A.5.5 0 0 1 3 8m10.657-
5.657a.5.5 0 0 1 0 .707l-1.414 1.415a.5.5 0 1 1-.707-.708l1.414-1.414a.5.5 0 0
1 .707 0m-9.193 9.193a.5.5 0 0 1 0 .707L3.05 13.657a.5.5 0 0 1-.707-.707l1.414-
1.414a.5.5 0 0 1 .707 0m9.193 2.121a.5.5 0 0 1-.707 0l-1.414-1.414a.5.5 0 0
1 .707-.707l1.414 1.414a.5.5 0 0 1 0 .707M4.464 4.465a.5.5 0 0 1-.707 0L2.343
3.05a.5.5 0 1 1 .707-.707l1.414 1.414a.5.5 0 0 1 0 .708"/></svg>';
document.getElementById('vulnerability-lookup-logo').src =
'/static/img/VL-hori-white-coul.png';
document.getElementById('btnThemeSwitch').setAttribute('title', 'Switch
to light theme');
document.cookie = "theme=dark; path=/; SameSite=Strict";
}
})
});
</script>
</body>
</html>
Error decoding JSON: Expecting value: line 3 column 1 (char 2)

You might also like