中危 Windows 打印后台处理程序远程执行代码漏洞
CVE编号
CVE-2021-36958利用情况
暂无补丁情况
官方补丁披露时间
2021-08-11漏洞描述
当 Windows Print Spooler 服务不正确地执行特权文件操作时,攻击者利用此漏洞可以使用 SYSTEM 权限运行任意代码。解决建议
受影响版本Windows Server, version 20H2 (Server Core Installation)Windows Server, version 2004 (Server Core installation)Windows Server 2019 (Server Core installation)Windows Server 2019Windows Server 2016 (Server Core installation)Windows Server 2016Windows Server 2012 R2 (Server Core installation)Windows Server 2012 R2Windows Server 2012 (Server Core installation)Windows Server 2012Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation)Windows Server 2008 for x64-based Systems Service Pack 2Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation)Windows Server 2008 for 32-bit Systems Service Pack 2Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)Windows Server 2008 R2 for x64-based Systems Service Pack 1Windows RT 8.1Windows 8.1 for x64-based systemsWindows 8.1 for 32-bit systemsWindows 7 for x64-based Systems Service Pack 1Windows 7 for 32-bit Systems Service Pack 1Windows 10 for x64-based SystemsWindows 10 for 32-bit SystemsWindows 10 Version 21H1 for x64-based SystemsWindows 10 Version 21H1 for ARM64-based SystemsWindows 10 Version 21H1 for 32-bit SystemsWindows 10 Version 20H2 for x64-based SystemsWindows 10 Version 20H2 for ARM64-based SystemsWindows 10 Version 20H2 for 32-bit SystemsWindows 10 Version 2004 for x64-based Systems目前厂商已发布升级补丁以修复漏洞,补丁获取链接:https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-36958一、用户可通过停止并禁用Print Spooler服务对此漏洞进行缓解:进入任务管理器,选择“服务”->”打开服务”->”选择Print Spooler”->”右键属性”。启动类型”选择”禁用”,并点击”停止”,关闭服务,点击”应用”和”确定”,使配置生效。注:停用此服务将导致打印功能失效。二、通过组策略禁用入站远程打印:运行组策略编辑器(Win+R,输入gpedit.msc,打开组策略编辑器),依次浏览到:计算机配置/管理模板/打印机:禁用“允许打印后台处理程序接受客户端连接:”策略以阻止远程攻击。注:此策略将通过阻止入站远程打印操作来阻止远程攻击。该系统将不再用作打印服务器,但仍然可以本地打印到直接连接的设备。- 攻击路径 远程
- 攻击复杂度 复杂
- 权限要求 无需权限
- 影响范围 全局影响
- EXP成熟度 未验证
- 补丁情况 官方补丁
- 数据保密性 数据泄露
- 数据完整性 传输被破坏
- 服务器危害 N/A
- 全网数量 N/A
CWE-ID | 漏洞类型 |
NVD-CWE-noinfo |
Exp相关链接

版权声明
本站原创文章转载请注明文章出处及链接,谢谢合作!
评论