• Skip to Content
  • Skip to Main Navigation
  • Skip to Search

Indiana University Indiana University IU

Open Search
  • Personal Preparedness
    • Email & phishing scams
    • Identity verification
    • IU passphrases
    • Hardware & software security
      • Laptop & mobile device security
      • Malware, scareware, & ransomware
      • Wearable technologies
      • Use of survey software
    • File sharing & copyright
      • Contesting copyright infringement notices
      • Disabling peer-to-peer file sharing
      • Copyright tutorial
      • Copyright infringement incident resolution
    • Vulnerability Disclosure Guidance
    • Keeping data safe
    • Web privacy
    • Account privileges
    • Remote Desktop
  • Information & IT Policies
    • Policy Hierarchy
    • Privacy policies & FAQ
    • Acceptable Use Agreement
    • Information & IT Policy Process
    • Cyber Risk Review
    • IT-12 Security Standards
  • Information Security & Privacy Program
    • Scope
    • Goals & Objectives
    • Governance
    • Principles
    • Safeguards
      • Risk assessment and treatment
      • Policy administration
      • Organization
      • Asset management
      • Human resources
      • Physical & environmental security
      • Communications & operations management
      • Identity & access control
      • Information systems acquisition, development, and maintenance
      • Incident management
      • Business continuity management
      • Compliance
    • Charter
  • Privacy Portal
    • Privacy matters
    • Sensitive data
      • Guidelines
    • Sharing institutional data with third parties
  • Resources for IT Staff
    • Information Risk Assessments
    • SecureMyResearch
    • Cloud computing
    • Audits & requirements
    • Data encryption
    • Back up data
    • Information security best practices
    • CIS Secure Suite
    • Disaster recovery planning
    • Managing employee data
    • Medical device security
    • Transferring data securely
    • Using SSH
    • Additional resources
      • Privacy Notice Generator
      • Incident Response Webservice
      • SSL/TLS certificates
  • About
    • Glossary of Terms
    • Trustees Resolution
  • Contact
  • Report an Incident
    • Report Privacy Incident or Request Assistance
    • Emergency IT Incidents
    • Managing Incidents
    • Identity Theft
    • Reporting Suspected Sensitive Data Exposures
    • Reporting Suspected HIPAA Data Exposures

Information Security & Policy

  • Home
  • Personal Preparedness
    • Email & phishing scams
    • Identity verification
    • IU passphrases
    • Hardware & software security
    • File sharing & copyright
    • Vulnerability Disclosure Guidance
    • Keeping data safe
    • Web privacy
    • Account privileges
    • Remote Desktop
  • Information & IT Policies
    • Policy Hierarchy
    • Privacy policies & FAQ
    • Acceptable Use Agreement
    • Information & IT Policy Process
    • Cyber Risk Review
    • IT-12 Security Standards
  • Information Security & Privacy Program
    • Scope
    • Goals & Objectives
    • Governance
    • Principles
    • Safeguards
    • Charter
  • Privacy Portal
    • Privacy matters
    • Sensitive data
    • Sharing institutional data with third parties
  • Resources for IT Staff
    • Information Risk Assessments
    • SecureMyResearch
    • Cloud computing
    • Audits & requirements
    • Data encryption
    • Back up data
    • Information security best practices
    • CIS Secure Suite
    • Disaster recovery planning
    • Managing employee data
    • Medical device security
    • Transferring data securely
    • Using SSH
    • Additional resources
  • Search
  • About
  • Contact
  • Report an Incident
  • Home
  • Security Bulletins
  • Critical Privilege Escalation Vulnerability in the Windows Print Spooler Service

Critical Privilege Escalation Vulnerability in the Windows Print Spooler Service

Friday, July 02, 2021

UPDATE

On July 6, 2021, Microsoft updated their advisory page on the CVE-2021-34527 vulnerability announcing there is now a patch for some versions of Windows for the vulnerability and the CVE-2021-1675 vulnerability. The UISO strongly recommends for everyone to install the latest patches for their version of Windows as soon as possible. If you need to manually download and install this patch, check the Security Updates table at the bottom of advisory page on the CVE-2021-34527 vulnerability for links to the Microsoft Update Catalog.

Background

On June 8, 2021, Microsoft disclosed and released an update for a privilege escalation vulnerability, CVE-2021-1675 affecting the Print Spooler service. This service manages the sending and receiving of print jobs and is installed and enabled by default on machines running Windows. In late June, third party security researchers demonstrated that this vulnerability could lead to remote code execution (RCE) and a proof-of-concept exploit was released on June 28th.  On June 30th, 2021, the Cybersecurity and Infrastructure Security Agency (CISA) confirmed that the update released by Microsoft was ineffective at mitigating the spooler vulnerability, and that the service remains vulnerable to remote code execution. The vulnerability was retitled to CVE-2021-34527 on July 1, 2021.

Impact

The exploit leverages an authenticated, compromised user account, whether domain-joined or local, to take control of a system via remote code execution.

Platforms affected

All versions of Windows, including workstation and server versions.

Local observations

The UISO has not observed local attacks exploiting this vulnerability.

UISO recommendations

UPDATE: There is now a patch for this vulnerability for some versions of Windows. Ensure all devices running Windows are fully patched. If a patch is not available for the version of Windows running on your device or a delay in patching is required, continue to follow the recommendations below.

Devices, including servers and workstations, which do not offer print services should immediately disable the print spooler service. 

Workstations running Windows should disable access to TCP port 445 if it is not needed or restrict access to authorized hosts via the host-based firewall. 

The most effective mitigation against this vulnerability is disabling the print spooler service, however, doing so will prevent the device from printing documents, including to virtual printers such as ‘Print to PDF’. Microsoft has provided instructions regarding how to disable the print spooler service.

Workarounds

There are no known workarounds which can be recommended.

Information Security & Policy resources

  • Leading in Cybersecurity
  • IU Data Management

Indiana University

Accessibility | College Scorecard | Privacy Notice | Copyright © 2025 The Trustees of Indiana University