服务公告

全部公告 > 安全公告 > Windows Print Spooler远程代码执行漏洞预警 (CVE-2021-1675)

Windows Print Spooler远程代码执行漏洞预警 (CVE-2021-1675)

2021-06-30

一、概要

近日,华为云关注到业界安全研究人员披露了Windows Print Spooler远程代码执行漏洞(CVE-2021-1675)POC,攻击者利用漏洞可绕过PfcAddPrinterDriver的安全验证,并在打印服务器中安装恶意的驱动程序,如果攻击者所控制的用户在域中,则攻击者可以连接到DC中的Spooler服务,并利用该漏洞在DC中安装恶意的驱动程序,完全的控制整个域环境,目前漏洞POC已公开,风险较高。

Windows Print Spooler是Windows的打印机后台处理程序,广泛运用于各种内网中。华为云提醒使用Windows Print Spooler的用户及时安排自检并做好安全加固以降低安全风险。

参考链接:https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-1675

二、威胁级别

威胁级别:【严重】

(说明:威胁级别共四级:一般、重要、严重、紧急)

三、漏洞影响范围

影响版本:

Windows Server 2019 (Server Core installation)

Windows Server 2019

Windows Server 2016 (Server Core installation)

Windows Server 2016

Windows Server 2012 R2 (Server Core installation)

Windows Server 2012 R2

Windows Server 2012 (Server Core installation)

Windows Server 2012

Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)

Windows Server 2008 R2 for x64-based Systems Service Pack 1

Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation)

Windows Server 2008 for x64-based Systems Service Pack 2

Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation)

Windows Server 2008 for 32-bit Systems Service Pack 2

Windows Server, version 2004 (Server Core installation)

Windows RT 8.1

Windows 8.1 for x64-based systems

Windows 8.1 for 32-bit systems

Windows 7 for x64-based Systems Service Pack 1

Windows 7 for 32-bit Systems Service Pack 1

Windows 10 Version 1607 for x64-based Systems

Windows 10 Version 1607 for 32-bit Systems

Windows 10 for x64-based Systems

Windows 10 for 32-bit Systems

Windows Server, version 20H2 (Server Core Installation)

Windows 10 Version 20H2 for ARM64-based Systems

Windows 10 Version 20H2 for 32-bit Systems

Windows 10 Version 20H2 for x64-based Systems

Windows 10 Version 2004 for x64-based Systems

Windows 10 Version 2004 for ARM64-based Systems

Windows 10 Version 2004 for 32-bit Systems

Windows 10 Version 21H1 for 32-bit Systems

Windows 10 Version 21H1 for ARM64-based Systems

Windows 10 Version 21H1 for x64-based Systems

Windows 10 Version 1909 for ARM64-based Systems

Windows 10 Version 1909 for x64-based Systems

Windows 10 Version 1909 for 32-bit Systems

Windows 10 Version 1809 for ARM64-based Systems

Windows 10 Version 1809 for x64-based Systems

Windows 10 Version 1809 for 32-bit Systems

四、安全建议

1、微软已在6月初的月度更新中发布了补丁,受影响用户可通过Windows Update自动更新微软补丁修复漏洞,也可以手动下载补丁,补丁下载地址:

https://msrc.microsoft.com/update-guide

2、若无法及时安装补丁,可通过禁用Print Spooler服务来进行临时风险规避

在服务应用(services.msc)中找到Print Spooler服务,停止运行服务并将“启动类型”修改为“禁用”。

3、为确保数据安全,建议重要业务数据进行异地备份。

注:修复漏洞前请将资料备份,并进行充分测试。