{"@odata.context":"https://api.msrc.microsoft.com/sug/v2.0/en-US/$metadata#vulnerability/$entity","id":"00000000-0000-0000-0000-00008f451db7","releaseDate":"2021-07-15T07:00:00Z","cveNumber":"CVE-2021-34481","cveTitle":"Windows Print Spooler Remote Code Execution Vulnerability","releaseNumber":"2021-Jul","vulnType":"Security Vulnerability","latestRevisionDate":"2021-08-10T07:00:00Z","description":"
A remote code execution vulnerability exists when the Windows Print Spooler service improperly performs privileged file operations. An attacker who successfully exploited this vulnerability could run arbitrary code with SYSTEM privileges. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.
\nUPDATE August 10, 2021: Microsoft has completed the investigation and has released security updates to address this vulnerability. Please see the Security Updates table for the applicable update for your system. We recommend that you install these updates immediately. This security update changes the Point and Print default behavior; please see KB5005652.
\n","cweList":[],"unformattedDescription":"A remote code execution vulnerability exists when the Windows Print Spooler service improperly performs privileged file operations. An attacker who successfully exploited this vulnerability could run arbitrary code with SYSTEM privileges. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.\n\n**UPDATE** August 10, 2021: Microsoft has completed the investigation and has released security updates to address this vulnerability. Please see the Security Updates table for the applicable update for your system. We recommend that you install these updates immediately. This security update changes the Point and Print default behavior; please see [KB5005652](https://support.microsoft.com/help/5005652).","mitreText":"CVE-2021-34481","mitreUrl":"https://www.cve.org/CVERecord?id=CVE-2021-34481","publiclyDisclosed":"Yes","exploited":"No","latestSoftwareReleaseId":1,"latestSoftwareRelease":"Exploitation More Likely","olderSoftwareReleaseId":1,"olderSoftwareRelease":"Exploitation More Likely","denialOfService":"N/A","tag":"Windows Print Spooler Components","issuingCna":"Microsoft","severityId":100000001,"severity":"Important","impactId":100000005,"impact":"Remote Code Execution","langCode":"en-US","baseScore":"8.8","temporalScore":"8.2","vectorString":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C","isMariner":false,"articles":[{"articleType":"FAQ","description":"Why did the security impact change from elevation of privilege to remote code execution?
\nWe became aware of a remote attack scenario for this vulnerability and revised our assessment accordingly.
\nDid the July 2021 security update introduce this vulnerability?
\nNo, the vulnerability existed before the July 13, 2021 security update. We recommend that Microsoft customers install the latest security updates.
\nWhy did the Point and Print default behavior change?
\nPlease see KB5005652.
\n","ordinal":10000}],"revisions":[{"cveNumber":"CVE-2021-34481","version":1.0,"revisionDate":"2021-07-15T07:00:00Z","initialDate":"0001-01-01T00:00:00Z","description":"Information published.
\n","unformattedDescription":"Information published.","notificationNeeded":false,"notificationSent":false,"sourceId":"1718b07b-9ee5-eb11-a83a-000d3a6d35d9"},{"cveNumber":"CVE-2021-34481","version":2.0,"revisionDate":"2021-08-10T07:00:00Z","initialDate":"0001-01-01T00:00:00Z","description":"CVE updated to announce that Microsoft is releasing security updates for all affected versions of Windows to address this vulnerability. Other information has been updated as well, including the following: 1) Impact has been changed to Remote Code Execution 2) Executive Summary has been updated 3) FAQs have been revised.
\n","unformattedDescription":"CVE updated to announce that Microsoft is releasing security updates for all affected versions of Windows to address this vulnerability. Other information has been updated as well, including the following: 1) Impact has been changed to Remote Code Execution 2) Executive Summary has been updated 3) FAQs have been revised.","notificationNeeded":false,"notificationSent":false,"sourceId":"be7b0dd4-b5f4-eb11-a83e-000d3a6d35d9"}]}