{"@odata.context":"https://api.msrc.microsoft.com/sug/v2.0/en-US/$metadata#vulnerability/$entity","id":"00000000-0000-0000-0000-00004a3114cd","releaseDate":"2021-06-08T07:00:00Z","cveNumber":"CVE-2021-1675","cveTitle":"Windows Print Spooler Remote Code Execution Vulnerability","releaseNumber":"2021-Jun","vulnType":"Security Vulnerability","latestRevisionDate":"2021-07-02T07:00:00Z","cweList":[],"mitreText":"CVE-2021-1675","mitreUrl":"https://www.cve.org/CVERecord?id=CVE-2021-1675","publiclyDisclosed":"No","exploited":"No","latestSoftwareReleaseId":2,"latestSoftwareRelease":"Exploitation Less Likely","olderSoftwareReleaseId":2,"olderSoftwareRelease":"Exploitation Less Likely","denialOfService":"N/A","tag":"Windows Print Spooler Components","issuingCna":"Microsoft","severityId":100000001,"severity":"Important","impactId":100000002,"impact":"Elevation of Privilege","langCode":"en-US","baseScore":"7.8","temporalScore":"6.8","vectorString":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C","isMariner":false,"articles":[{"articleType":"FAQ","description":"
Is this the vulnerability that has been referred to publicly as PrintNightmare?
\nNo, Microsoft has assigned CVE-2021-34527 to PrintNightmare. CVE-2021-1675 is similar but distinct from CVE-2021-34527.
\n","ordinal":10000}],"revisions":[{"cveNumber":"CVE-2021-1675","version":1.0000000000,"revisionDate":"2021-06-08T07:00:00Z","initialDate":"0001-01-01T00:00:00Z","description":"Information published.
\n","unformattedDescription":"Information published.","notificationNeeded":false,"notificationSent":false,"sourceId":"bd78ed96-873a-eb11-a82e-000d3a6d3364"},{"cveNumber":"CVE-2021-1675","version":1.1000000000,"revisionDate":"2021-06-21T07:00:00Z","initialDate":"0001-01-01T00:00:00Z","description":"Corrected the CVE title to address the vulnerability as remote code execution. In the Affected Products table, corrected the Impact to Remote Code Execution and the Severity to Critical. This is an informational change only.
\n","unformattedDescription":"Corrected the CVE title to address the vulnerability as remote code execution. In the Affected Products table, corrected the Impact to Remote Code Execution and the Severity to Critical. This is an informational change only.","notificationNeeded":false,"notificationSent":false,"sourceId":"84dbbabe-77d3-eb11-a840-000d3a6d3364"},{"cveNumber":"CVE-2021-1675","version":1.2000000000,"revisionDate":"2021-07-02T07:00:00Z","initialDate":"0001-01-01T00:00:00Z","description":"Added FAQ information. This is an informational change only.
\n","unformattedDescription":"Added FAQ information. This is an informational change only.","notificationNeeded":false,"notificationSent":false,"sourceId":"bc3219ac-8ddb-eb11-a841-000d3a6d3364"}]}