Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%
Get alerts for future matching vulnerabilitiesLog in to subscribe
I. Basic Information for CVE-2021-1675
Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Windows Print Spooler Remote Code Execution Vulnerability
Source: NVD (National Vulnerability Database)
Vulnerability Description
Windows Print Spooler Remote Code Execution Vulnerability
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Microsoft Windows Print Spooler Components 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Microsoft Windows Print Spooler Components是美国微软(Microsoft)公司的一个打印后台处理程序组件。 Microsoft Windows Print Spooler Components存在安全漏洞。以下产品和版本受到影响:Windows 10 Version 1809 for 32-bit Systems,Windows 10 Version 1809 for x64-based Systems,Windows 10 Version 1809 for AR
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)
Affected Products
VendorProductAffected VersionsCPESubscribe
MicrosoftWindows 10 Version 1809 10.0.0 ~ 10.0.17763.1999 cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.1999:*:*:*:*:*:x86:*
MicrosoftWindows Server 2019 10.0.0 ~ 10.0.17763.1999 cpe:2.3:o:microsoft:windows_server_2019:10.0.17763.1999:*:*:*:*:*:*:*
MicrosoftWindows Server 2019 (Server Core installation) 10.0.0 ~ 10.0.17763.1999 cpe:2.3:o:microsoft:windows_server_2019:10.0.17763.1999:*:*:*:*:*:*:*
MicrosoftWindows 10 Version 1909 10.0.0 ~ 10.0.18363.1621 cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.1621:*:*:*:*:*:x86:*
MicrosoftWindows 10 Version 21H1 10.0.0 ~ 10.0.19043.1052 cpe:2.3:o:microsoft:windows_10_21H1:10.0.19043.1052:*:*:*:*:*:x64:*
MicrosoftWindows 10 Version 2004 10.0.0 ~ 10.0.19041.1052 cpe:2.3:o:microsoft:windows_10_1809:10.0.19041.1052:*:*:*:*:*:x64:*
MicrosoftWindows Server version 2004 10.0.0 ~ 10.0.19041.1052 cpe:2.3:o:microsoft:windows_server_2004:10.0.19041.1052:*:*:*:*:*:*:*
MicrosoftWindows 10 Version 20H2 10.0.0 ~ 10.0.19042.1052 cpe:2.3:o:microsoft:windows_10_20H2:10.0.19042.1052:*:*:*:*:*:x86:*
MicrosoftWindows Server version 20H2 10.0.0 ~ 10.0.19042.1052 cpe:2.3:o:microsoft:windows_server_20H2:10.0.19042.1052:*:*:*:*:*:*:*
MicrosoftWindows 10 Version 1507 10.0.0 ~ 10.0.10240.18967 cpe:2.3:o:microsoft:windows_10_1507:10.0.10240.18967:*:*:*:*:*:x86:*
MicrosoftWindows 10 Version 1607 10.0.0 ~ 10.0.14393.4467 cpe:2.3:o:microsoft:windows_10_1607:10.0.14393.4467:*:*:*:*:*:x86:*
MicrosoftWindows Server 2016 10.0.0 ~ 10.0.14393.4467 cpe:2.3:o:microsoft:windows_server_2016:10.0.14393.4467:*:*:*:*:*:*:*
MicrosoftWindows Server 2016 (Server Core installation) 10.0.0 ~ 10.0.14393.4467 cpe:2.3:o:microsoft:windows_server_2016:10.0.14393.4467:*:*:*:*:*:*:*
MicrosoftWindows 7 6.1.0 ~ 6.1.7601.25632 cpe:2.3:o:microsoft:windows_7:6.1.7601.25632:sp1:*:*:*:*:x86:*
MicrosoftWindows 7 Service Pack 1 6.1.0 ~ 6.1.7601.25632 cpe:2.3:o:microsoft:windows_7:6.1.7601.25632:sp1:*:*:*:*:x64:*
MicrosoftWindows 8.1 6.3.0 ~ 6.3.9600.20045 cpe:2.3:o:microsoft:windows_8.1:6.3.9600.20045:*:*:*:*:*:x86:*
MicrosoftWindows Server 2008 Service Pack 2 6.0.0 ~ 6.0.6003.21137 cpe:2.3:o:microsoft:windows_server_2008_sp2:6.0.6003.21137:*:*:*:*:*:x64:*
MicrosoftWindows Server 2008 Service Pack 2 (Server Core installation) 6.0.0 ~ 6.0.6003.21137 cpe:2.3:o:microsoft:windows_server_2008_sp2:6.0.6003.21137:*:*:*:*:*:x64:*
MicrosoftWindows Server 2008 Service Pack 2 6.0.0 ~ 6.0.6003.21137 cpe:2.3:o:microsoft:windows_server_2008_sp2:6.0.6003.21137:*:*:*:*:*:x86:*
MicrosoftWindows Server 2008 R2 Service Pack 1 6.1.0 ~ 6.1.7601.25632 cpe:2.3:o:microsoft:windows_server_2008_R2:6.1.7601.25632:*:*:*:*:*:x64:*
MicrosoftWindows Server 2008 R2 Service Pack 1 (Server Core installation) 6.0.0 ~ 6.1.7601.25632 cpe:2.3:o:microsoft:windows_server_2008_R2:6.1.7601.25632:*:*:*:*:*:x64:*
MicrosoftWindows Server 2012 6.2.0 ~ 6.2.9200.23372 cpe:2.3:o:microsoft:windows_server_2012:6.2.9200.23372:*:*:*:*:*:x64:*
MicrosoftWindows Server 2012 (Server Core installation) 6.2.0 ~ 6.2.9200.23372 cpe:2.3:o:microsoft:windows_server_2012:6.2.9200.23372:*:*:*:*:*:x64:*
MicrosoftWindows Server 2012 R2 6.3.0 ~ 6.3.9600.20045 cpe:2.3:o:microsoft:windows_server_2012_R2:6.3.9600.20045:*:*:*:*:*:x64:*
MicrosoftWindows Server 2012 R2 (Server Core installation) 6.3.0 ~ 6.3.9600.20045 cpe:2.3:o:microsoft:windows_server_2012_R2:6.3.9600.20045:*:*:*:*:*:x64:*
II. Public POCs for CVE-2021-1675
#POC DescriptionSource LinkShenlong Link
1CVE-2021-1675 exploithttps://github.com/yu2u/CVE-2021-1675POC Details
2C# and Impacket implementation of PrintNightmare CVE-2021-1675/CVE-2021-34527https://github.com/cube0x0/CVE-2021-1675POC Details
3CVE-2021-1675 Detection Infohttps://github.com/LaresLLC/CVE-2021-1675POC Details
4Nonehttps://github.com/kondah/patch-cve-2021-1675POC Details
5PrintNightmare , Local Privilege Escalation of CVE-2021-1675 or CVE-2021-34527https://github.com/evilashz/CVE-2021-1675-LPE-EXPPOC Details
6Local Privilege Escalation Edition for CVE-2021-1675/CVE-2021-34527https://github.com/hlldz/CVE-2021-1675-LPEPOC Details
7Nonehttps://github.com/puckiestyle/CVE-2021-1675POC Details
8Nonehttps://github.com/cybersecurityworks553/CVE-2021-1675_PrintNightMarePOC Details
9Fix without disabling Print Spoolerhttps://github.com/tanarchytan/CVE-2021-1675POC Details
10Pure PowerShell implementation of CVE-2021-1675 Print Spooler Local Privilege Escalation (PrintNightmare)https://github.com/calebstewart/CVE-2021-1675POC Details
11Vulnerability Scanner for CVE-2021-1675/PrintNightmarehttps://github.com/Leonidus0x10/CVE-2021-1675-SCANNERPOC Details
12Nonehttps://github.com/thomasgeens/CVE-2021-1675POC Details
13Nonehttps://github.com/mrezqi/CVE-2021-1675_CarbonBlack_HuntingQueryPOC Details
14Nonehttps://github.com/killtr0/CVE-2021-1675-PrintNightmarePOC Details
15Nonehttps://github.com/corelight/CVE-2021-1675POC Details
16A small powershell script to disable print spooler service using desired state configurationhttps://github.com/kougyokugentou/CVE-2021-1675POC Details
17CVE-2021-1675: ZERO-DAY VULNERABILITY IN WINDOWS PRINTER SERVICE WITH AN EXPLOIT AVAILABLE IN ALL OPERATING SYSTEM VERSIONShttps://github.com/ptter23/CVE-2021-1675POC Details
18to catch cve-2021-1675-printnightmarehttps://github.com/initconf/cve-2021-1675-printnightmarePOC Details
19Windows Print Spooler Service RCE CVE-2021-1675 (PrintNightmare)https://github.com/ozergoker/PrintNightmarePOC Details
20Youtube : https://youtu.be/Zr0KjYDSFKQhttps://github.com/exploitblizzard/PrintNightmare-CVE-2021-1675POC Details
21Nonehttps://github.com/edsonjt81/CVE-2021-1675POC Details
22CVE-2021-1675 (PrintNightmare)https://github.com/sailay1996/PrintNightmare-LPEPOC Details
23Information on the Windows Spooler vulnerability - CVE-2021-1675; CVE 2021 34527https://github.com/JumpsecLabs/PrintNightmarePOC Details
24Nonehttps://github.com/bartimusprimed/CVE-2021-1675-YaraPOC Details
25Nonehttps://github.com/k8gege/cve-2021-1675POC Details
26CVE-2021-1675 / CVE-2021-34527 - PrintNightmare Python, C# and PowerShell Exploits Implementations (LPE & RCE)https://github.com/galoget/PrintNightmare-CVE-2021-1675-CVE-2021-34527POC Details
27Nonehttps://github.com/thalpius/Microsoft-CVE-2021-1675POC Details
28Nonehttps://github.com/zha0/Microsoft-CVE-2021-1675POC Details
29Nonehttps://github.com/Winter3un/CVE-2021-1675POC Details
30see https://github.com/cube0x0/CVE-2021-1675https://github.com/hahaleyile/my-CVE-2021-1675POC Details
31PrintNightMare LPE提权漏洞的CS 反射加载插件。开箱即用、通过内存加载、混淆加载的驱动名称来ByPass Defender/EDR。https://github.com/mstxq17/CVE-2021-1675_RDL_LPEPOC Details
32Python implementation for PrintNightmare (CVE-2021-1675 / CVE-2021-34527)https://github.com/ly4k/PrintNightmarePOC Details
33C# PrintNightmare (CVE-2021-1675)https://github.com/Wra7h/SharpPNPOC Details
34Working PowerShell POChttps://github.com/OppressionBreedsResistance/CVE-2021-1675-PrintNightmarePOC Details
35Temporary mitigation to the CVE-2021-1675. 'Spooler' service-disabled based on time schedule. PowerShell Scripts and Task Scheduler code provided. https://github.com/5l1v3r1/CVE-2021-1675-Mitigation-For-Systems-That-Need-SpoolerPOC Details
36CVE-2021-1675 LPE PoC in Nim (PrintNightmare Local Privilege Escalation)https://github.com/eversinc33/NimNightmarePOC Details
37PrintNightmare Local Privilege Escalation https://github.com/AndrewTrube/CVE-2021-1675POC Details
38Nonehttps://github.com/TheJoyOfHacking/cube0x0-CVE-2021-1675POC Details
39Nonehttps://github.com/TheJoyOfHacking/calebstewart-CVE-2021-1675POC Details
40Nonehttps://github.com/jj4152/cve-2021-1675POC Details
41Learn about the vulnerability known as PrintNightmare (CVE-2021-1675) and (CVE-2021-34527)https://github.com/r1skkam/PrintNightmarePOC Details
42A one-click script to gain a System privileges command line in Windows 10 20H2 that exploits CVE-2021-1675https://github.com/peckre/PNCVE-Win10-20H2-ExploitPOC Details
43Nonehttps://github.com/whoami-chmod777/CVE-2021-1675-CVE-2021-34527POC Details
44Nonehttps://github.com/whoami-chmod777/CVE-2021-1675---PrintNightmare-LPE-PowerShell-POC Details
45Nonehttps://github.com/Sp4ceDogy/NPE-CS-V-CVE-2021-1675POC Details
46C# and Impacket implementation of PrintNightmare CVE-2021-1675/CVE-2021-34527https://github.com/CameraShutterBug/PrintNightmarePOC Details
47Nonehttps://github.com/DLL00P/CVE-2021-1675POC Details
48C# and Impacket implementation of PrintNightmare CVE-2021-1675/CVE-2021-34527https://github.com/GlacierGossip/PrintNightmarePOC Details
49Nonehttps://github.com/000Tonio/cve-2021-1675POC Details
50C# and Impacket implementation of PrintNightmare CVE-2021-1675/CVE-2021-34527https://github.com/ArtAtrium/PrintNightmarePOC Details
51C# and Impacket implementation of PrintNightmare CVE-2021-1675/CVE-2021-34527https://github.com/VoiidByte/ImpacketPOC Details
52C# and Impacket implementation of PrintNightmare CVE-2021-1675/CVE-2021-34527https://github.com/ccordeiro/CVE-2021-1675POC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC
III. Intelligence Information for CVE-2021-1675
Please Login to view more intelligence information
IV. Related Vulnerabilities
V. Comments for CVE-2021-1675

No comments yet


Leave a comment