<p>A remote code execution vulnerability exists when the Windows Print Spooler service improperly performs privileged file operations. An attacker who successfully exploited this vulnerability could run arbitrary code with SYSTEM privileges. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.</p>
<p><strong>UPDATE</strong> August 10, 2021: Microsoft has completed the investigation and has released security updates to address this vulnerability. Please see the Security Updates table for the applicable update for your system. We recommend that you install these updates immediately. This security update changes the Point and Print default behavior; please see <a href="https://support.microsoft.com/help/5005652">KB5005652</a>.</p>
                
            References
                    | Link | Resource | 
|---|---|
| https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-34481 | Patch Vendor Advisory | 
| https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-34481 | Patch Vendor Advisory | 
Configurations
                    Configuration 1 (hide)
            
            
  | 
    
History
                    No history.
Information
                Published : 2021-07-16 21:15
Updated : 2024-11-21 06:10
NVD link : CVE-2021-34481
Mitre link : CVE-2021-34481
CVE.ORG link : CVE-2021-34481
JSON object : View
Products Affected
                microsoft
- windows_server_2016
 - windows_rt_8.1
 - windows_10
 - windows_8.1
 - windows_server_2012
 - windows_7
 - windows_server_2019
 - windows_server_2008
 
CWE
                
                    
                        
                        CWE-269
                        
            Improper Privilege Management
