Vulnerability   
Search   
    Search 324607 CVE descriptions
and 146377 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.818162
Category:Windows : Microsoft Bulletins
Title:Microsoft Windows Print Spooler RCE Vulnerability (KB5005010, PrintNightmare)
Summary:This host is missing a critical security update according to; Microsoft KB5005010. The flaw is dubbed 'PrintNightmare'.
Description:Summary:
This host is missing a critical security update according to
Microsoft KB5005010. The flaw is dubbed 'PrintNightmare'.

Vulnerability Insight:
The flaw is due to the Microsoft Windows Print Spooler service
which fails to restrict access to functionality that allows users to add printers and related
drivers.

Vulnerability Impact:
Successful exploitation allow attackers to execute arbitrary code
with SYSTEM privileges on a vulnerable system.

Affected Software/OS:
- Microsoft Windows 10 x32/x64

- Microsoft Windows Server 2019

- Microsoft Windows Server 2016

- Microsoft Windows 7 x32/x64

- Microsoft Windows 8.1 x32/x64

- Microsoft Windows Server 2008 x32

- Microsoft Windows Server 2008 R2 x64

- Microsoft Windows Server 2012

- Microsoft Windows Server 2012 R2

Solution:
The vendor has released updates.

In addition to installing the updates users are recommended to either disable the Print Spooler
service, or to Disable inbound remote printing through Group Policy.

Please see the references for more information.

CVSS Score:
9.0

CVSS Vector:
AV:N/AC:L/Au:S/C:C/I:C/A:C

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2021-34527
http://packetstormsecurity.com/files/167261/Print-Spooler-Remote-DLL-Injection.html
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-34527
CopyrightCopyright (C) 2021 Greenbone AG

This is only one of 146377 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.