CVE-2021-34481
EUVD-2021-2113616.07.2021, 21:15
<p>A remote code execution vulnerability exists when the Windows Print Spooler service improperly performs privileged file operations. An attacker who successfully exploited this vulnerability could run arbitrary code with SYSTEM privileges. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.</p> <p><strong>UPDATE</strong> August 10, 2021: Microsoft has completed the investigation and has released security updates to address this vulnerability. Please see the Security Updates table for the applicable update for your system. We recommend that you install these updates immediately. This security update changes the Point and Print default behavior; please see <a href="https://support.microsoft.com/help/5005652">KB5005652</a>.</p>Enginsight
Affected Products (NVD)
| Vendor | Product | Version |
|---|---|---|
| microsoft | windows_10 | - |
| microsoft | windows_7 | - |
| microsoft | windows_8.1 | - |
| microsoft | windows_rt_8.1 | - |
| microsoft | windows_server_2008 | - |
| microsoft | windows_server_2012 | - |
| microsoft | windows_server_2016 | - |
| microsoft | windows_server_2019 | - |
𝑥
= Vulnerable software versions
Windows Releases
Platform | Version | ||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Windows 10 |
| ||||||||||||||
| Windows 7 |
| ||||||||||||||
| Windows 8.1 |
| ||||||||||||||
| Windows RT 8.1 |
| ||||||||||||||
| Windows Server |
| ||||||||||||||
| Windows Server 2008 |
| ||||||||||||||
| Windows Server 2008 R2 |
| ||||||||||||||
| Windows Server 2012 |
| ||||||||||||||
| Windows Server 2012 R2 |
| ||||||||||||||
| Windows Server 2016 |
| ||||||||||||||
| Windows Server 2019 |
|
Common Weakness Enumeration