First published: Thu Aug 12 2021(Updated: )
Windows Print Spooler Remote Code Execution Vulnerability
Credit: secure@microsoft.com
Affected Software | Affected Version | How to fix |
---|---|---|
Microsoft Windows 10 | ||
Microsoft Windows 10 | =20h2 | |
Microsoft Windows 10 | =21h1 | |
Microsoft Windows 10 | =1607 | |
Microsoft Windows 10 | =1809 | |
Microsoft Windows 10 | =1909 | |
Microsoft Windows 10 | =2004 | |
Microsoft Windows 7 | =sp1 | |
Microsoft Windows 8.1 | ||
Microsoft Windows RT | ||
Microsoft Windows Server | =sp2 | |
Microsoft Windows Server | =r2-sp1 | |
Microsoft Windows Server | ||
Microsoft Windows Server | =r2 | |
Microsoft Windows Server 2016 | ||
Microsoft Windows Server 2016 | =20h2 | |
Microsoft Windows Server 2016 | =2004 | |
Microsoft Windows Server 2019 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
CVE-2021-36936 has a severity rating of critical due to its potential for remote code execution.
To fix CVE-2021-36936, apply the latest security updates provided by Microsoft for affected Windows versions.
CVE-2021-36936 affects various versions of Windows including Windows 10, Windows 7, Windows 8.1, and multiple Windows Server editions.
Yes, CVE-2021-36936 can be exploited remotely, allowing attackers to execute arbitrary code on affected systems.
Ensure that your systems are updated with the latest security patches and monitor for any unusual activity associated with Print Spooler services.