{"uuid": "42c070b1-6b74-44a6-acde-b731c7f4530e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-34527", "type": "seen", "source": "https://t.me/cKure/6111", "content": "\u25a0\u25a0\u25a0\u25a0\u25a0 Microsoft this week pushed an out-of-band patch for\u00a0CVE-2021-34527, which now has a CVSS \u201chigh severity\u201d score of 8.2.\n\nMimikatz creator\u00a0Benjamin Delpy said\u00a0the problem relates to the Point and Print function, which is designed to allow a Windows client to create a connection to a remote printer with first requiring installation media.\nThat effectively means an authenticated user could still gain administrator-level privileges on a machine running the Print Spooler service\u00a0to run arbitrary code.\n\nMicrosoft acknowledged\u00a0the issue at the bottom of its advisory.\n\u201cPoint and Print is not directly related to this vulnerability, but the technology weakens the local security posture in such a way that exploitation will be possible,\u201d it admitted. \u201cTo disallow Point and Print for non-administrators make sure that warning and elevation prompts are shown for printer installs and updates.\u201d", "creation_timestamp": "2021-07-08T10:48:07.000000Z"}