{"id":17425,"date":"2021-07-13T08:29:36","date_gmt":"2021-07-13T08:29:36","guid":{"rendered":"https:\/\/nsfocusglobal.com\/?p=17425"},"modified":"2026-04-17T18:07:46","modified_gmt":"2026-04-17T18:07:46","slug":"windows-print-spooler-rce-vulnerabilities-cve-2021-1675-cve-2021-34527-mitigation-guide","status":"publish","type":"post","link":"https:\/\/nsfocusglobal.com\/pt-br\/windows-print-spooler-rce-vulnerabilities-cve-2021-1675-cve-2021-34527-mitigation-guide\/","title":{"rendered":"Windows Print Spooler RCE Vulnerabilities (CVE-2021-1675\/CVE-2021-34527) Mitigation Guide"},"content":{"rendered":"<!DOCTYPE html PUBLIC \"-\/\/W3C\/\/DTD HTML 4.0 Transitional\/\/EN\" \"http:\/\/www.w3.org\/TR\/REC-html40\/loose.dtd\">\n<html><body><h2 class=\"wp-block-heading\">Overview<\/h2>\n\n\n\n<p>On July 7, 2021, Beijing time, Microsoft released a security patch on the PrintNightmare vulnerability (CVE-2021-34527). NSFOCUS CERT recommends that users install this patch as soon as possible.<\/p>\n\n\n\n<p>On June 29, NSFOCUS CERT found that a security researcher published an exploit of the Windows Print Spooler remote code execution (RCE) vulnerability (PrintNightmare) on GitHub. Print Spooler is a print-related service in Windows for managing all local and network print queues and controlling all print jobs. The Print Spooler service is <strong>enabled by default<\/strong> on Windows. A common user can exploit this RCE vulnerability to elevate to a SYSTEM user. In a domain environment, a domain user can exploit this vulnerability to execute arbitrary code on the domain controller with SYSTEM privileges, thus taking control of the entire domain. <strong>NSFOCUS&#8217;s research team found that this vulnerability could still be exploited even if a fix released by Microsoft in June for CVE-2021-1675 had been installed. <\/strong>On July 2, Beijing time, Microsoft released an advisory on the CVE-2021-34527 vulnerability and provided a workaround.<\/p>\n\n\n\n<p>Before that, Mimikatz had weaponized the exploit:<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img fetchpriority=\"high\" decoding=\"async\" width=\"1010\" height=\"409\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/07\/a.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-17426\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/07\/a.jpg 1010w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/07\/a-300x121.jpg 300w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/07\/a-768x311.jpg 768w\" sizes=\"(max-width: 1010px) 100vw, 1010px\" \/><\/figure>\n\n\n\n<p>Reference links:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2021-1675\">https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2021-1675<\/a><\/li><li><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2021-34527\">https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2021-34527<\/a><\/li><\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">Timeline<\/h2>\n\n\n\n<ul class=\"wp-block-list\"><li>2021-06-09 Microsoft released its June 2021 security updates, in which CVE-2021-1675 was identified to be a local privilege escalation vulnerability.<\/li><li>2021-06-09 NSFOCUS CERT released a security advisory, pointing out that this vulnerability could be exploited to achieve RCE in a domain environment.<\/li><li>2021-06-21 Microsoft updated its advisory, redefining CVE-2021-1675 as an RCE vulnerability.<\/li><li>2021-06-29 The proof of concept (PoC) of the vulnerability was published.<\/li><li>2021-06-29 A video clip of the vulnerability being exploited in a patched Windows Server 2019 environment was released.<\/li><li>2021-07-01 Mimikatz implemented weaponized integration.<\/li><li>2021-07-02 Microsoft released an emergency advisory on CVE-2021-34527 (without providing any patches).<\/li><li>2021-07-02 NSFOCUS CERT updated its advisory.<\/li><li>2021-07-07 Microsoft released a patch for CVE-2021-34527.<\/li><li>2021-07-07 NSFOCUS CERT released the vulnerability mitigation guide.<\/li><\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">Scope of Impact<\/h2>\n\n\n\n<p><strong>Affected Versions<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Windows Server 2012 R2 (Server Core installation)<\/li><li>Windows Server 2012 R2<\/li><li>Windows Server 2012 (Server Core installation)<\/li><li>Windows Server 2012<\/li><li>Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)<\/li><li>Windows Server 2008 R2 for x64-based Systems Service Pack 1<\/li><li>Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation)<\/li><li>Windows Server 2008 for x64-based Systems Service Pack 2<\/li><li>Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation)<\/li><li>Windows Server 2008 for 32-bit Systems Service Pack 2<\/li><li>Windows RT 8.1<\/li><li>Windows 8.1 for x64-based systems<\/li><li>Windows 8.1 for 32-bit systems<\/li><li>Windows 7 for x64-based Systems Service Pack 1<\/li><li>Windows 7 for 32-bit Systems Service Pack 1<\/li><li>Windows Server 2016 (Server Core installation)<\/li><li>Windows Server 2016<\/li><li>Windows 10 Version 1607 for x64-based Systems<\/li><li>Windows 10 Version 1607 for 32-bit Systems<\/li><li>Windows 10 for x64-based Systems<\/li><li>Windows 10 for 32-bit Systems<\/li><li>Windows Server, version 20H2 (Server Core Installation)<\/li><li>Windows 10 Version 20H2 for ARM64-based Systems<\/li><li>Windows 10 Version 20H2 for 32-bit Systems<\/li><li>Windows 10 Version 20H2 for x64-based Systems<\/li><li>Windows Server, version 2004 (Server Core installation)<\/li><li>Windows 10 Version 2004 for x64-based Systems<\/li><li>Windows 10 Version 2004 for ARM64-based Systems<\/li><li>Windows 10 Version 2004 for 32-bit Systems<\/li><li>Windows 10 Version 21H1 for 32-bit Systems<\/li><li>Windows 10 Version 21H1 for ARM64-based Systems<\/li><li>Windows 10 Version 21H1 for x64-based Systems<\/li><li>Windows Server, version 1909 (Server Core installation)<\/li><li>Windows 10 Version 1909 for ARM64-based Systems<\/li><li>Windows 10 Version 1909 for x64-based Systems<\/li><li>Windows 10 Version 1909 for 32-bit Systems<\/li><li>Windows Server 2019 (Server Core installation)<\/li><li>Windows Server 2019<\/li><li>Windows 10 Version 1809 for ARM64-based Systems<\/li><li>Windows 10 Version 1809 for x64-based Systems<\/li><li>Windows 10 Version 1809 for 32-bit Systems<\/li><\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">Check for the Vulnerability<\/h2>\n\n\n\n<p><strong>Detection with NSFOCUS Products<\/strong><\/p>\n\n\n\n<p>NSFOCUS Remote Security Assessment System (RSAS), Network Intrusion Detection System (NIDS), and Unified Threat Sensor (UTS) are capable of scanning and detecting this vulnerability. Please update these products to the latest versions.<\/p>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Product<\/td><td>Update Package Version<\/td><td>Download Link<\/td><\/tr><tr><td>RSAS V6 system plug-in package<\/td><td>V6.0R02F01.2400<\/td><td>http:\/\/update.nsfocus.com\/update\/listRsasDetail\/v\/vulsys<\/td><\/tr><tr><td>NIDS<\/td><td>5.6.9.25788<\/td><td>http:\/\/update.nsfocus.com\/update\/listNewidsDetail\/v\/rule5.6.9<\/td><\/tr><tr><td><\/td><td>5.6.10.25788<\/td><td>http:\/\/update.nsfocus.com\/update\/listNewidsDetail\/v\/rule5.6.10<\/td><\/tr><tr><td><\/td><td>5.6.11.25788<\/td><td>http:\/\/update.nsfocus.com\/update\/listNewidsDetail\/v\/rule5.6.11<\/td><\/tr><tr><td>UTS<\/td><td>5.6.10.25788<\/td><td>http:\/\/update.nsfocus.com\/update\/listNewidsDetail\/v\/rule2.0.0<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">Mitigation<\/h2>\n\n\n\n<p><strong>Patch Update<\/strong><\/p>\n\n\n\n<p>Currently, Microsoft has released security patches to fix this vulnerability in system versions supported by Microsoft. Affected users are strongly advised to apply these patches as soon as possible, which are available at the following links:<\/p>\n\n\n\n<p><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2021-1675\">https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2021-1675<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2021-34527\">https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2021-34527<\/a><\/p>\n\n\n\n<p>Currently, some Windows versions have had no patches for CVE-2021-34527. Microsoft said that security updates for these versions would be released soon. Users should monitor this closely and update as fixes become available.<\/p>\n\n\n\n<p>Before installing patches for the vulnerabilities in question, users should install other updates first. For details, please visit <a href=\"https:\/\/support.microsoft.com\/zh-cn\/topic\/july-6-2021-kb5004945-os-builds-19041-1083-19042-1083-and-19043-1083-out-of-band-44b34928-0a71-4473-aa22-ecf3b83eed0e\">https:\/\/support.microsoft.com\/zh-cn\/topic\/july-6-2021-kb5004945-os-builds-19041-1083-19042-1083-and-19043-1083-out-of-band-44b34928-0a71-4473-aa22-ecf3b83eed0e<\/a>.<\/p>\n\n\n\n<p>Note: Windows Update may fail due to network and computer environment problems. Therefore, users are advised to check whether the patches are successfully applied immediately upon installation.<\/p>\n\n\n\n<p>Please right-click the Windows icon, select <strong>Settings (N)<\/strong>, choose <strong>System and Security &gt; Windows Update<\/strong>, and view the prompt message on the page. Alternatively, please view historical updates by clicking the <strong>View update history<\/strong> button.<\/p>\n\n\n\n<p>If some updates cannot be successfully installed, please click the update names to jump to Microsoft&#8217;s download page. Users are advised to click the links on the page to visit the &#8220;Microsoft Update Catalog&#8221; website to download and install independent packages.<\/p>\n\n\n\n<p><strong>Workaround<\/strong><\/p>\n\n\n\n<ol class=\"wp-block-list\" type=\"1\"><li>Disable the Print Spooler service:<\/li><\/ol>\n\n\n\n<p>Open the Task Manager, select the <strong>Services<\/strong> tab, click <strong>Open Services<\/strong>, and scroll down to <strong>Print Spooler<\/strong>. Right-click the name and choose <strong>Properties<\/strong> from the shortcut menu.<\/p>\n\n\n\n<p>Select <strong>Disable<\/strong> for <strong>Startup type<\/strong> and click <strong>Stop<\/strong>. Then click <strong>Apply<\/strong> and <strong>OK<\/strong> to make the settings take effect.<\/p>\n\n\n\n<p>Note: Disabling this service renders the print function unavailable.<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Disable inbound remote printing through Group Policy.<\/li><\/ul>\n\n\n\n<p>Run the Group Policy editor (press <strong>Win+R<\/strong> and type <strong>gpedit.msc<\/strong>). Browse to <strong>Computer Configuration &gt; Administrative Templates &gt; Printers<\/strong> and disable the &#8220;Allow Print Spooler to accept client connections:&#8221; policy to block remote attacks.<\/p>\n\n\n\n<p>Note: This policy will block the remote attack vector by preventing inbound remote printing operations. The system will no longer function as a print server, but local printing to a directly attached device will still be possible.<\/p>\n\n\n\n<p><strong>Protection with NSFOCUS Products<\/strong><\/p>\n\n\n\n<p>NSFOCUS Network Intrusion Protection System (NIPS) has released related rules to defend against this vulnerability. Users are advised to update the rule base to the latest version to ensure that the security product can effectively protect against this vulnerability. The following table lists the rule base versions of the security product.<\/p>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Product<\/td><td>Rule Base Version<\/td><td>Download Link<\/td><\/tr><tr><td>NIPS<\/td><td>5.6.9.25788<\/td><td>http:\/\/update.nsfocus.com\/update\/listNewipsDetail\/v\/rule5.6.9<\/td><\/tr><tr><td><\/td><td>5.6.10.25788<\/td><td>http:\/\/update.nsfocus.com\/update\/listNewipsDetail\/v\/rule5.6.10<\/td><\/tr><tr><td><\/td><td>5.6.11.25788<\/td><td>http:\/\/update.nsfocus.com\/update\/listNewipsDetail\/v\/rule5.6.11<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">Statement<\/h2>\n\n\n\n<p>This advisory is only used to describe a potential risk. NSFOCUS does not provide any commitment or promise on this advisory. NSFOCUS and the author will not bear any liability for any direct and\/or indirect consequences and losses caused by transmitting and\/or using this advisory. NSFOCUS reserves all the rights to modify and interpret this advisory. Please include this statement paragraph when reproducing or transferring this advisory. Do not modify this advisory, add\/delete any information to\/from it, or use this advisory for commercial purposes without permission from NSFOCUS.<\/p>\n<\/body><\/html>\n","protected":false},"excerpt":{"rendered":"<p>Overview On July 7, 2021, Beijing time, Microsoft released a security patch on the PrintNightmare vulnerability (CVE-2021-34527). NSFOCUS CERT recommends that users install this patch as soon as possible. On June 29, NSFOCUS CERT found that a security researcher published an exploit of the Windows Print Spooler remote code execution (RCE) vulnerability (PrintNightmare) on GitHub. [&hellip;]<\/p>\n","protected":false},"author":6,"featured_media":35785,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_coblocks_attr":"","_coblocks_dimensions":"","_coblocks_responsive_height":"","_coblocks_accordion_ie_support":"","footnotes":""},"categories":[6],"tags":[758],"class_list":["post-17425","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-emergency-response","tag-windows-vulnerability"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Windows Print Spooler RCE Vulnerabilities (CVE-2021-1675\/CVE-2021-34527) Mitigation Guide - NSFOCUS<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/nsfocusglobal.com\/windows-print-spooler-rce-vulnerabilities-cve-2021-1675-cve-2021-34527-mitigation-guide\/\" \/>\n<meta property=\"og:locale\" content=\"pt_BR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Windows Print Spooler RCE Vulnerabilities (CVE-2021-1675\/CVE-2021-34527) Mitigation Guide - NSFOCUS\" \/>\n<meta property=\"og:description\" content=\"Overview On July 7, 2021, Beijing time, Microsoft released a security patch on the PrintNightmare vulnerability (CVE-2021-34527). NSFOCUS CERT recommends\" \/>\n<meta property=\"og:url\" content=\"https:\/\/nsfocusglobal.com\/windows-print-spooler-rce-vulnerabilities-cve-2021-1675-cve-2021-34527-mitigation-guide\/\" \/>\n<meta property=\"og:site_name\" content=\"NSFOCUS\" \/>\n<meta property=\"article:published_time\" content=\"2021-07-13T08:29:36+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-17T18:07:46+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/07\/a-1.jpg\" \/>\n<meta name=\"author\" content=\"Jie Ji\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Windows Print Spooler RCE Vulnerabilities (CVE-2021-1675\/CVE-2021-34527) Mitigation Guide - NSFOCUS\" \/>\n<meta name=\"twitter:description\" content=\"Overview On July 7, 2021, Beijing time, Microsoft released a security patch on the PrintNightmare vulnerability (CVE-2021-34527). NSFOCUS CERT recommends\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/07\/a-1.jpg\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jie Ji\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. tempo de leitura\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/windows-print-spooler-rce-vulnerabilities-cve-2021-1675-cve-2021-34527-mitigation-guide\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/windows-print-spooler-rce-vulnerabilities-cve-2021-1675-cve-2021-34527-mitigation-guide\\\/\"},\"author\":{\"name\":\"Jie Ji\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#\\\/schema\\\/person\\\/1077d8fcd7e52c96f17a33b63a0d157b\"},\"headline\":\"Windows Print Spooler RCE Vulnerabilities (CVE-2021-1675\\\/CVE-2021-34527) Mitigation Guide\",\"datePublished\":\"2021-07-13T08:29:36+00:00\",\"dateModified\":\"2026-04-17T18:07:46+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/windows-print-spooler-rce-vulnerabilities-cve-2021-1675-cve-2021-34527-mitigation-guide\\\/\"},\"wordCount\":1240,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/windows-print-spooler-rce-vulnerabilities-cve-2021-1675-cve-2021-34527-mitigation-guide\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2021\\\/07\\\/a-1.jpg\",\"keywords\":[\"Windows Vulnerability\"],\"articleSection\":[\"Emergency Response\"],\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/nsfocusglobal.com\\\/windows-print-spooler-rce-vulnerabilities-cve-2021-1675-cve-2021-34527-mitigation-guide\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/windows-print-spooler-rce-vulnerabilities-cve-2021-1675-cve-2021-34527-mitigation-guide\\\/\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/windows-print-spooler-rce-vulnerabilities-cve-2021-1675-cve-2021-34527-mitigation-guide\\\/\",\"name\":\"Windows Print Spooler RCE Vulnerabilities (CVE-2021-1675\\\/CVE-2021-34527) Mitigation Guide - NSFOCUS\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/windows-print-spooler-rce-vulnerabilities-cve-2021-1675-cve-2021-34527-mitigation-guide\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/windows-print-spooler-rce-vulnerabilities-cve-2021-1675-cve-2021-34527-mitigation-guide\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2021\\\/07\\\/a-1.jpg\",\"datePublished\":\"2021-07-13T08:29:36+00:00\",\"dateModified\":\"2026-04-17T18:07:46+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/windows-print-spooler-rce-vulnerabilities-cve-2021-1675-cve-2021-34527-mitigation-guide\\\/#breadcrumb\"},\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/nsfocusglobal.com\\\/windows-print-spooler-rce-vulnerabilities-cve-2021-1675-cve-2021-34527-mitigation-guide\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/windows-print-spooler-rce-vulnerabilities-cve-2021-1675-cve-2021-34527-mitigation-guide\\\/#primaryimage\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2021\\\/07\\\/a-1.jpg\",\"contentUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2021\\\/07\\\/a-1.jpg\",\"width\":1010,\"height\":409,\"caption\":\"Command prompt window displaying system information.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/windows-print-spooler-rce-vulnerabilities-cve-2021-1675-cve-2021-34527-mitigation-guide\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/nsfocusglobal.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Windows Print Spooler RCE Vulnerabilities (CVE-2021-1675\\\/CVE-2021-34527) Mitigation Guide\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#website\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/\",\"name\":\"NSFOCUS\",\"description\":\"Security Made Smart and Simple\",\"publisher\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/nsfocusglobal.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pt-BR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#organization\",\"name\":\"NSFOCUS\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/logo-ns.png\",\"contentUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/logo-ns.png\",\"width\":248,\"height\":36,\"caption\":\"NSFOCUS\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#\\\/schema\\\/person\\\/1077d8fcd7e52c96f17a33b63a0d157b\",\"name\":\"Jie Ji\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/61cb438513c138ce3f1f49e3485f113a0215220de5e284a2bd4e85358f6c8d02?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/61cb438513c138ce3f1f49e3485f113a0215220de5e284a2bd4e85358f6c8d02?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/61cb438513c138ce3f1f49e3485f113a0215220de5e284a2bd4e85358f6c8d02?s=96&d=mm&r=g\",\"caption\":\"Jie Ji\"},\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/author\\\/jji\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Windows Print Spooler RCE Vulnerabilities (CVE-2021-1675\/CVE-2021-34527) Mitigation Guide - NSFOCUS","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/nsfocusglobal.com\/windows-print-spooler-rce-vulnerabilities-cve-2021-1675-cve-2021-34527-mitigation-guide\/","og_locale":"pt_BR","og_type":"article","og_title":"Windows Print Spooler RCE Vulnerabilities (CVE-2021-1675\/CVE-2021-34527) Mitigation Guide - NSFOCUS","og_description":"Overview On July 7, 2021, Beijing time, Microsoft released a security patch on the PrintNightmare vulnerability (CVE-2021-34527). NSFOCUS CERT recommends","og_url":"https:\/\/nsfocusglobal.com\/windows-print-spooler-rce-vulnerabilities-cve-2021-1675-cve-2021-34527-mitigation-guide\/","og_site_name":"NSFOCUS","article_published_time":"2021-07-13T08:29:36+00:00","article_modified_time":"2026-04-17T18:07:46+00:00","og_image":[{"url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/07\/a-1.jpg","type":"","width":"","height":""}],"author":"Jie Ji","twitter_card":"summary_large_image","twitter_title":"Windows Print Spooler RCE Vulnerabilities (CVE-2021-1675\/CVE-2021-34527) Mitigation Guide - NSFOCUS","twitter_description":"Overview On July 7, 2021, Beijing time, Microsoft released a security patch on the PrintNightmare vulnerability (CVE-2021-34527). NSFOCUS CERT recommends","twitter_image":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/07\/a-1.jpg","twitter_misc":{"Escrito por":"Jie Ji","Est. tempo de leitura":"6 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/nsfocusglobal.com\/windows-print-spooler-rce-vulnerabilities-cve-2021-1675-cve-2021-34527-mitigation-guide\/#article","isPartOf":{"@id":"https:\/\/nsfocusglobal.com\/windows-print-spooler-rce-vulnerabilities-cve-2021-1675-cve-2021-34527-mitigation-guide\/"},"author":{"name":"Jie Ji","@id":"https:\/\/nsfocusglobal.com\/#\/schema\/person\/1077d8fcd7e52c96f17a33b63a0d157b"},"headline":"Windows Print Spooler RCE Vulnerabilities (CVE-2021-1675\/CVE-2021-34527) Mitigation Guide","datePublished":"2021-07-13T08:29:36+00:00","dateModified":"2026-04-17T18:07:46+00:00","mainEntityOfPage":{"@id":"https:\/\/nsfocusglobal.com\/windows-print-spooler-rce-vulnerabilities-cve-2021-1675-cve-2021-34527-mitigation-guide\/"},"wordCount":1240,"commentCount":0,"publisher":{"@id":"https:\/\/nsfocusglobal.com\/#organization"},"image":{"@id":"https:\/\/nsfocusglobal.com\/windows-print-spooler-rce-vulnerabilities-cve-2021-1675-cve-2021-34527-mitigation-guide\/#primaryimage"},"thumbnailUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/07\/a-1.jpg","keywords":["Windows Vulnerability"],"articleSection":["Emergency Response"],"inLanguage":"pt-BR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/nsfocusglobal.com\/windows-print-spooler-rce-vulnerabilities-cve-2021-1675-cve-2021-34527-mitigation-guide\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/nsfocusglobal.com\/windows-print-spooler-rce-vulnerabilities-cve-2021-1675-cve-2021-34527-mitigation-guide\/","url":"https:\/\/nsfocusglobal.com\/windows-print-spooler-rce-vulnerabilities-cve-2021-1675-cve-2021-34527-mitigation-guide\/","name":"Windows Print Spooler RCE Vulnerabilities (CVE-2021-1675\/CVE-2021-34527) Mitigation Guide - NSFOCUS","isPartOf":{"@id":"https:\/\/nsfocusglobal.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/nsfocusglobal.com\/windows-print-spooler-rce-vulnerabilities-cve-2021-1675-cve-2021-34527-mitigation-guide\/#primaryimage"},"image":{"@id":"https:\/\/nsfocusglobal.com\/windows-print-spooler-rce-vulnerabilities-cve-2021-1675-cve-2021-34527-mitigation-guide\/#primaryimage"},"thumbnailUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/07\/a-1.jpg","datePublished":"2021-07-13T08:29:36+00:00","dateModified":"2026-04-17T18:07:46+00:00","breadcrumb":{"@id":"https:\/\/nsfocusglobal.com\/windows-print-spooler-rce-vulnerabilities-cve-2021-1675-cve-2021-34527-mitigation-guide\/#breadcrumb"},"inLanguage":"pt-BR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/nsfocusglobal.com\/windows-print-spooler-rce-vulnerabilities-cve-2021-1675-cve-2021-34527-mitigation-guide\/"]}]},{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/nsfocusglobal.com\/windows-print-spooler-rce-vulnerabilities-cve-2021-1675-cve-2021-34527-mitigation-guide\/#primaryimage","url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/07\/a-1.jpg","contentUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/07\/a-1.jpg","width":1010,"height":409,"caption":"Command prompt window displaying system information."},{"@type":"BreadcrumbList","@id":"https:\/\/nsfocusglobal.com\/windows-print-spooler-rce-vulnerabilities-cve-2021-1675-cve-2021-34527-mitigation-guide\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/nsfocusglobal.com\/"},{"@type":"ListItem","position":2,"name":"Windows Print Spooler RCE Vulnerabilities (CVE-2021-1675\/CVE-2021-34527) Mitigation Guide"}]},{"@type":"WebSite","@id":"https:\/\/nsfocusglobal.com\/#website","url":"https:\/\/nsfocusglobal.com\/","name":"NSFOCUS","description":"Security Made Smart and Simple","publisher":{"@id":"https:\/\/nsfocusglobal.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/nsfocusglobal.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pt-BR"},{"@type":"Organization","@id":"https:\/\/nsfocusglobal.com\/#organization","name":"NSFOCUS","url":"https:\/\/nsfocusglobal.com\/","logo":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/nsfocusglobal.com\/#\/schema\/logo\/image\/","url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/08\/logo-ns.png","contentUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/08\/logo-ns.png","width":248,"height":36,"caption":"NSFOCUS"},"image":{"@id":"https:\/\/nsfocusglobal.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/nsfocusglobal.com\/#\/schema\/person\/1077d8fcd7e52c96f17a33b63a0d157b","name":"Jie Ji","image":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/secure.gravatar.com\/avatar\/61cb438513c138ce3f1f49e3485f113a0215220de5e284a2bd4e85358f6c8d02?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/61cb438513c138ce3f1f49e3485f113a0215220de5e284a2bd4e85358f6c8d02?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/61cb438513c138ce3f1f49e3485f113a0215220de5e284a2bd4e85358f6c8d02?s=96&d=mm&r=g","caption":"Jie Ji"},"url":"https:\/\/nsfocusglobal.com\/pt-br\/author\/jji\/"}]}},"_links":{"self":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts\/17425","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/comments?post=17425"}],"version-history":[{"count":0,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts\/17425\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/media\/35785"}],"wp:attachment":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/media?parent=17425"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/categories?post=17425"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/tags?post=17425"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}