CVE-2021-34527, an RCE vulnerability, dubbed PrintNightmare affects Windows print spooler. The print spooler is a default component in all Windows systems that allows the computer to interact with the printer and order the print jobs in your queue. This vulnerability is due to improper privileged file operations performed by the print spooler. It's a critical vulnerability that allows attackers to remotely execute code with system-level privileges on affected machines. After security researchers accidentally published proof-of-concept (PoC) exploit code, Microsoft has now issued out-of-band security updates to address the flaw. All versions of Windows are vulnerable.
Desktop Central supports patches for CVE-2021-34527. Update the vulnerability database and scan all the machines in your network to detect missing patches associated with CVE-2021-34527.
To patch the vulnerability from the console,
Navigate to Patch Management > Patches > Critical Vulnerabilities.
Select "ZeroDay_CVE-2021-34527" in the Vulnerability Type filter.
All the patches fixing CVE-2021-34527 will be displayed. Select the patches and click on Install Patch.
Alternatively, you can find the relevant patches in this missing patches view by searching for the bulletin ID/Patch ID mentioned below:
Patches for Windows server 2012, Windows server 2016, Windows 10 version 1607 are now supported in our product.
You can find patches for those operating systems in the missing patches view by searching for the bulletin ID/Patch ID mentioned below: