Cyber Security News

Windows Print Spooler RCE Zero-day (CVE-2021-34527) Let Hackers Take Over The Entire System Remotely

Microsoft has released an emergency update for remote code execution vulnerability in Windows Print Spooler. The flaw allows a remote authenticated attacker to attacker execute arbitrary code with SYSTEM privileges.

By gaining access to the system, the attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.

A remote attacker can exploit the flaw by sending a request to the printer via RpcAddPrinterDriverEx() or RpcAsyncAddPrinterDriver() and they able to execute the code SYSTEM privileges.

A local unprivileged user may be able to execute arbitrary code with SYSTEM privileges as well, CERT added.

The bug tracked as CVE-2021-34527 (CVSS score: 8.8), Microsoft learned that active exploitation attempts targeting the vulnerability.

CERT said that “the Microsoft Windows Print Spooler service fails to restrict access to functionality that allows users to add printers and related drivers, which can allow a remote authenticated attacker to execute arbitrary code with SYSTEM privileges on a vulnerable system.”

Microsoft has released a fix for the public vulnerability that has a new feature that allows customers to implement stronger protections.

The security updates are not available for all Windows operating systems, the updates are delayed by Microsoft for Windows Server 2016, Windows 10, version 1607, and Windows Server 2012.

The patches issued for:

  • Windows Server 2019
  • Windows Server 2012 R2
  • Windows Server 2008
  • Windows 8.1
  • Windows RT 8.1, and
  • Windows 10 (versions 21H1, 20H2, 2004, 1909, 1809, 1803, and 1507)

According to CERT, the updates from Microsoft only fix the Remote Code Execution (RCE via SMB and RPC) and not the Local Privilege Escalation (LPE) variant. CERT recommends Disabling the Print Spooler service and Disable inbound remote printing service.

Note: This vulnerability is distinct from CVE-2021-1675 and it does not protect from the public exploits that may refer to PrintNightmare or CVE-2021-1675.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity and hacking news updates.

Guru Baran

Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Recent Posts

SecAI Debuts at RSA 2025, Redefining Threat Investigation with AI

By fusing agentic AI and contextual threat intelligence, SecAI transforms investigation from a bottleneck into…

3 hours ago

How Healthcare Providers Investigate And Prevent Cyber Attacks: Real-world Examples

According to IBM Security annual research, "Cost of a Data Breach Report 2024", an average…

3 hours ago

NVIDIA Riva Vulnerabilities Exposes Enable Authorized Access to Cloud Environments

A critical security flaw in NVIDIA's Riva framework, an AI-powered speech and translation service, has…

4 hours ago

CISA Adds Broadcom Brocade Fabric OS Vulnerability to Known Exploited Vulnerabilities Catalog

CISA officially added a significant security flaw affecting Broadcom’s Brocade Fabric OS to its authoritative…

4 hours ago

AirPlay Zero-Click RCE Vulnerability Enables Remote Device Takeover via Wi-Fi

A critical vulnerability in Apple’s AirPlay protocol, dubbed AirBorne, has exposed over 2.35 billion active…

5 hours ago

Google Chrome Vulnerability Let Attackers Escape Payload from Sandbox – Technical Details Disclosed

A critical vulnerability in Google Chrome has recently been discovered that allows malicious actors to…

5 hours ago