CVE-2021-34483
📋 TL;DR
This vulnerability allows authenticated attackers to execute arbitrary code with SYSTEM privileges on Windows systems by exploiting the Print Spooler service. It affects Windows servers and workstations where the Print Spooler service is enabled. Attackers can gain complete control of affected systems.
💻 Affected Systems
- Windows 10
- Windows Server 2019
- Windows Server 2016
- Windows Server 2012 R2
- Windows 8.1
📦 What is this software?
Windows 10 by Microsoft
Windows 10 by Microsoft
Windows 10 by Microsoft
Windows 10 by Microsoft
Windows 10 by Microsoft
Windows 10 by Microsoft
Windows 10 by Microsoft
Windows 7 by Microsoft
Windows 8.1 by Microsoft
Windows Rt 8.1 by Microsoft
⚠️ Risk & Real-World Impact
Worst Case
Full system compromise with SYSTEM privileges, enabling installation of malware, data theft, lateral movement, and persistence.
Likely Case
Privilege escalation from authenticated user to SYSTEM, allowing attackers to bypass security controls and maintain persistence.
If Mitigated
Limited impact if Print Spooler is disabled or proper network segmentation prevents access to vulnerable systems.
🎯 Exploit Status
Exploit requires authenticated access. Multiple proof-of-concept exploits have been published since disclosure.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: July 2021 security updates - KB5004237 for Windows 10 21H1, KB5004238 for Windows 10 20H2, etc.
Vendor Advisory: https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-34483
Restart Required: Yes
Instructions:
1. Apply July 2021 Windows security updates from Windows Update. 2. For enterprise: Deploy via WSUS, SCCM, or Intune. 3. Restart affected systems after patching.
🔧 Temporary Workarounds
Disable Print Spooler Service
windowsStops the vulnerable service from running
sc stop spooler
sc config spooler start= disabled
Restrict Spooler Directory Permissions
windowsLimits access to Print Spooler directories
icacls %systemroot%\system32\spool\printers /deny "Authenticated Users:(OI)(CI)(DE,DC)"
icacls %systemroot%\system32\spool\drivers /deny "Authenticated Users:(OI)(CI)(DE,DC)"
🧯 If You Can't Patch
- Disable Print Spooler service on non-print servers
- Implement network segmentation to isolate print servers from critical systems
🔍 How to Verify
Check if Vulnerable:
Check if Print Spooler service is running and system has not been patched with July 2021 updates
Check Version:
systeminfo | findstr /B /C:"OS Name" /C:"OS Version"
Verify Fix Applied:
Verify July 2021 security updates are installed via 'systeminfo' or 'Get-Hotfix'
📡 Detection & Monitoring
Log Indicators:
- Event ID 7036 for Print Spooler service stops/starts
- Unexpected Print Spooler service restarts
- Suspicious process creation from spoolsv.exe
Network Indicators:
- Unexpected RPC connections to Print Spooler service (port 135, 445, 139)
SIEM Query:
source="windows" event_id=7036 AND service_name="Spooler" AND (state="stopped" OR state="started")