Windows Print Spooler Remote Code Execution Vulnerability
Published: 2021-06-29
Researchers published and deleted proof-of-concept code for a remote code execution vulnerability in Windows Print Spooler, called PrintNightmare, though the PoC is likely still available. Update July 2: The Background, Analysis and Solution sections have been updated with new information for CVE-2021-34527 issued by Microsoft on July 1. No patch has yet been released for the new CVE, but additional information and mitigation options are offered in the advisory.
https://www.tenable.com/blog/from-bugs-to-breaches-25-significant-cves-as-mitre-cve-turns-25
https://www.tenable.com/cyber-exposure/a-look-inside-the-ransomware-ecosystem
https://www.cisa.gov/news-events/cybersecurity-advisories/aa22-117a
https://www.tenable.com/cyber-exposure/2021-threat-landscape-retrospective
https://therecord.media/printnightmare-vulnerability-weaponized-by-magniber-ransomware-gang
https://www.kb.cert.org/vuls/id/383432
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-1675
http://packetstormsecurity.com/files/167261/Print-Spooler-Remote-DLL-Injection.html
http://packetstormsecurity.com/files/163349/Microsoft-PrintNightmare-Proof-Of-Concept.html