CVE-2021-34527

HIGH KEV RANSOMWARE

Microsoft Windows 10 1507 < 10.0.10240.18969 - Remote Code Execution

Title source: rule

Description

<p>A remote code execution vulnerability exists when the Windows Print Spooler service improperly performs privileged file operations. An attacker who successfully exploited this vulnerability could run arbitrary code with SYSTEM privileges. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.</p> <p>UPDATE July 7, 2021: The security update for Windows Server 2012, Windows Server 2016 and Windows 10, Version 1607 have been released. Please see the Security Updates table for the applicable update for your system. We recommend that you install these updates immediately. If you are unable to install these updates, see the FAQ and Workaround sections in this CVE for information on how to help protect your system from this vulnerability.</p> <p>In addition to installing the updates, in order to secure your system, you must confirm that the following registry settings are set to 0 (zero) or are not defined (<strong>Note</strong>: These registry keys do not exist by default, and therefore are already at the secure setting.), also that your Group Policy setting are correct (see FAQ):</p> <ul> <li>HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows NT\Printers\PointAndPrint</li> <li>NoWarningNoElevationOnInstall = 0 (DWORD) or not defined (default setting)</li> <li>UpdatePromptSettings = 0 (DWORD) or not defined (default setting)</li> </ul> <p><strong>Having NoWarningNoElevationOnInstall set to 1 makes your system vulnerable by design.</strong></p> <p>UPDATE July 6, 2021: Microsoft has completed the investigation and has released security updates to address this vulnerability. Please see the Security Updates table for the applicable update for your system. We recommend that you install these updates immediately. If you are unable to install these updates, see the FAQ and Workaround sections in this CVE for information on how to help protect your system from this vulnerability. See also <a href="https://support.microsoft.com/topic/31b91c02-05bc-4ada-a7ea-183b129578a7">KB5005010: Restricting installation of new printer drivers after applying the July 6, 2021 updates</a>.</p> <p>Note that the security updates released on and after July 6, 2021 contain protections for CVE-2021-1675 and the additional remote code execution exploit in the Windows Print Spooler service known as “PrintNightmare”, documented in CVE-2021-34527.</p>

Exploits (31)

nomisec SCANNER 804 stars
by byt3bl33d3r · poc
https://github.com/byt3bl33d3r/ItWasAllADream
nomisec WORKING POC 304 stars
by JohnHammond · local
https://github.com/JohnHammond/CVE-2021-34527
nomisec WORKING POC 165 stars
by nemo-wq · remote-auth
https://github.com/nemo-wq/PrintNightmare-CVE-2021-34527
nomisec WORKING POC 119 stars
by m8sec · remote
https://github.com/m8sec/CVE-2021-34527
nomisec WORKING POC 22 stars
by hackerhouse-opensource · local
https://github.com/hackerhouse-opensource/cve-2021-34527
nomisec SUSPICIOUS 5 stars
by CnOxx1 · poc
https://github.com/CnOxx1/CVE-2021-34527-1675
nomisec WRITEUP 3 stars
by Tomparte · poc
https://github.com/Tomparte/PrintNightmare
nomisec WORKING POC 3 stars
by dywhoami · infoleak
https://github.com/dywhoami/CVE-2021-34527-Scanner-Based-On-cube0x0-POC
nomisec SCANNER 2 stars
by 0xirison · poc
https://github.com/0xirison/PrintNightmare-Patcher
nomisec WORKING POC 2 stars
by thomas-lauer · poc
https://github.com/thomas-lauer/PrintNightmare
nomisec WRITEUP 2 stars
by rdboboia · poc
https://github.com/rdboboia/disable-RegisterSpoolerRemoteRpcEndPoint
nomisec SCANNER 2 stars
by powershellpr0mpt · poc
https://github.com/powershellpr0mpt/PrintNightmare-CVE-2021-34527
nomisec WORKING POC 1 stars
by cyb3rpeace · local
https://github.com/cyb3rpeace/CVE-2021-34527
nomisec WORKING POC 1 stars
by Amaranese · poc
https://github.com/Amaranese/CVE-2021-34527
gitlab SUSPICIOUS
by pgregoire-ci · poc
https://gitlab.com/pgregoire-ci/CVE-2021-34527
nomisec WORKING POC
by AUSK1LL9 · poc
https://github.com/AUSK1LL9/CVE-2021-34527
nomisec NO CODE
by Hirusha-N · poc
https://github.com/Hirusha-N/CVE-2021-34527-CVE-2023-38831-and-CVE-2023-32784
nomisec SCANNER
by TieuLong21Prosper · poc
https://github.com/TieuLong21Prosper/detect_bruteforce
nomisec WORKING POC
by d0rb · poc
https://github.com/d0rb/CVE-2021-34527
nomisec WRITEUP
by syntaxbearror · poc
https://github.com/syntaxbearror/PowerShell-PrintNightmare
nomisec WORKING POC
by Eutectico · poc
https://github.com/Eutectico/Printnightmare
nomisec WRITEUP
by WidespreadPandemic · poc
https://github.com/WidespreadPandemic/CVE-2021-34527_ACL_mitigation
nomisec STUB
by glorisonlai · poc
https://github.com/glorisonlai/printnightmare
nomisec WORKING POC
by geekbrett · poc
https://github.com/geekbrett/CVE-2021-34527-PrintNightmare-Workaround
nomisec STUB
by vinaysudheer · poc
https://github.com/vinaysudheer/Disable-Spooler-Service-PrintNightmare-CVE-2021-34527
nomisec SCANNER
by DenizSe · poc
https://github.com/DenizSe/CVE-2021-34527
metasploit WORKING POC
by Zhiniang Peng, Xuefeng Li, Zhipeng Huo, Piotr Madej, Zhang Yunhai, cube0x0, Spencer McIntyre, Christophe De La Fuente · rubypocwin
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/windows/dcerpc/cve_2021_1675_printnightmare.rb
patchapalooza WORKING POC
by whoami-chmod777 · local
https://github.com/whoami-chmod777/CVE-2021-1675-CVE-2021-34527
patchapalooza WORKING POC
by d0nkeyk0ng787 · remote
https://github.com/d0nkeyk0ng787/PrintNightmare-POC
patchapalooza WORKING POC
by ly4k · remote-auth
https://github.com/ly4k/PrintNightmare
patchapalooza WORKING POC
by cube0x0 · remote-auth
https://github.com/cube0x0/CVE-2021-1675

Scores

CVSS v3 8.8
EPSS 0.9424
EPSS Percentile 99.9%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Details

CISA KEV 2021-11-03
VulnCheck KEV 2021-07-02
InTheWild.io 2021-07-16
ENISA EUVD EUVD-2021-21181
Ransomware Use Confirmed
Status published
Products (19)
microsoft/windows_10_1507 < 10.0.10240.18969
microsoft/windows_10_1607 < 10.0.14393.4470
microsoft/windows_10_1809 < 10.0.17763.2029
microsoft/windows_10_20h2 < 10.0.19042.1083
microsoft/windows_10_21h2 < 10.0.19044.1415
microsoft/windows_10_22h2 < 10.0.19045.2251
microsoft/windows_11_21h2 < 10.0.22000.318
microsoft/windows_11_22h2 < 10.0.22621.674
microsoft/windows_7
microsoft/windows_8.1
... and 9 more
Published Jul 02, 2021
KEV Added Nov 03, 2021
Tracked Since Feb 18, 2026