An elevation of privilege vulnerability exists when the Windows Print Spooler service improperly allows arbitrary writing to the file system, aka 'Windows Print Spooler Elevation of Privilege Vulnerability'.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
microsoft windows 10 - |
||
microsoft windows 10 1607 |
||
microsoft windows 10 1709 |
||
microsoft windows 10 1803 |
||
microsoft windows 10 1809 |
||
microsoft windows 10 1903 |
||
microsoft windows 10 1909 |
||
microsoft windows 10 2004 |
||
microsoft windows 7 sp1 |
||
microsoft windows 8.1 - |
||
microsoft windows rt 8.1 - |
||
microsoft windows server 2008 - |
||
microsoft windows server 2008 r2 |
||
microsoft windows server 2012 - |
||
microsoft windows server 2012 r2 |
||
microsoft windows server 2016 - |
||
microsoft windows server 2016 1903 |
||
microsoft windows server 2016 1909 |
||
microsoft windows server 2016 2004 |
||
microsoft windows server 2019 - |
UPDATE
A proof-of-concept for a critical Windows security vulnerability that allows remote code execution (RCE) was dropped on GitHub on Tuesday – and while it was taken back down within a few hours, the code was copied and is still out there circulating on the platform.
The bug (CVE-2021-1675) exists in the Windows Print Spooler and has been dubbed “PrintNightmare” by researchers. It was originally addressed in June’s Patch Tuesday updates from Microsoft as a minor elevation...
Researchers found a way to bypass a patch Microsoft released to address a bug in the Windows printing services, which gives attackers a path to executing malicious code with elevated privileges.
Tracked as CVE-2020-1048, the initial flaw received an initial fix in May and another one is coming with this month’s rollout of security updates from Microsoft.
Discovered and reported responsibly by Peleg Hadar and Tomer Bar of SafeBreach Labs,
affects Windows Print Spooler, the s...