CVE-2021-36958: Windows Print Spooler Remote Code Execution Vulnerability

Overview

Severity
High (CVSS 7.8)
CVSS Vector
CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
Category
Remote Code Execution
Exploit Status
Not Exploited
Exploitation Likelihood
More Likely
Publicly Disclosed
Yes
Patch Tuesday
2021-Aug
Released
2021-08-11
Last Updated
2021-09-14
EPSS Score
4.71% (percentile: 89.4%)

Description

A remote code execution vulnerability exists when the Windows Print Spooler service improperly performs privileged file operations. An attacker who successfully exploited this vulnerability could run arbitrary code with SYSTEM privileges. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.

FAQ

When will Microsoft release a security update for this vulnerability? Update: September 14, 2021 - We have completed the investigation and have released the September 2021 security updates to address this vulnerability. Please see the Security Updates table. What versions of Windows are affected by this vulnerability? Update: September 14, 2021 - The September 2021 security updates are now available to address this vulnerability. Please see the Security Updates table for the versions of Windows that are affected.

Affected Products (40)

Other

  • 11568
  • 11569
  • 11570
  • 11571
  • 11572
  • 11712
  • 11713
  • 11714
  • 11896
  • 11897
  • 11898
  • 11766
  • 11767
  • 11768
  • 11769
  • 11800
  • 11801
  • 11802
  • 11803
  • 10729
  • 10735
  • 10852
  • 10853
  • 10816
  • 10855
  • 10047
  • 10048
  • 10481
  • 10482
  • 10484
  • 9312
  • 10287
  • 9318
  • 9344
  • 10051
  • 10049
  • 10378
  • 10379
  • 10483
  • 10543

Security Updates (13)

Acknowledgments

<a href="https://twitter.com/offenseindepth">Victor Mata</a> of FusionX, Accenture Security

Revision History

  • 2021-08-11: Information published.
  • 2021-09-14: CVE updated to announce that Microsoft is releasing the September 2021 security updates for all affected versions of Windows to address this vulnerability. Additionally, other information has been updated, including the following: 1) Executive Summary has been updated. 2) Workarounds have been removed as they are no longer applicable. 3) FAQs have been updated to reflect the release of the September 2021 security updates. 4) CVSS Vector String has been updated.