Windows Print Spooler Remote Code Execution Vulnerability

PrintNightmare Patch verfügbar

Schwachstelle kann geschlossen werden

Aus dieser Liste geht hervor, für welche Systeme die Updates bereits vorliegen. In der unten angehängten Excelliste sind alle Links enthalten.

PrintNightmare Patch verfügbar für folgende Systeme:

ProduktSchweregradArticleDownloadDetails
Windows Server 2012 R2 (Server Core installation)Critical5004954Monthly RollupCVE-2021-34527
Windows Server 2012 R2 (Server Core installation)Critical5004958Security OnlyCVE-2021-34527
Windows Server 2012 R2Critical5004954Monthly RollupCVE-2021-34527
Windows Server 2012 R2Critical5004958Security OnlyCVE-2021-34527
Windows Server 2012 (Server Core installation)Critical5004956Monthly RollupCVE-2021-34527
Windows Server 2012 (Server Core installation)Critical5004960Security OnlyCVE-2021-34527
Windows Server 2012Critical5004956Monthly RollupCVE-2021-34527
Windows Server 2012Critical5004960Security OnlyCVE-2021-34527
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)Critical5004953Monthly RollupCVE-2021-34527
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)Critical5004951Security OnlyCVE-2021-34527
Windows Server 2008 R2 for x64-based Systems Service Pack 1Critical5004953Monthly RollupCVE-2021-34527
Windows Server 2008 R2 for x64-based Systems Service Pack 1Critical5004951Security OnlyCVE-2021-34527
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation)Critical5004955Monthly RollupCVE-2021-34527
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation)Critical5004959Security OnlyCVE-2021-34527
Windows Server 2008 for x64-based Systems Service Pack 2Critical5004955Monthly RollupCVE-2021-34527
Windows Server 2008 for x64-based Systems Service Pack 2Critical5004959Security OnlyCVE-2021-34527
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation)Critical5004955Monthly RollupCVE-2021-34527
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation)Critical5004959Security OnlyCVE-2021-34527
Windows Server 2008 for 32-bit Systems Service Pack 2Critical5004955Monthly RollupCVE-2021-34527
Windows Server 2008 for 32-bit Systems Service Pack 2Critical5004959Security OnlyCVE-2021-34527
Windows RT 8.1Critical5004954Monthly RollupCVE-2021-34527
Windows 8.1 for x64-based systemsCritical5004954Monthly RollupCVE-2021-34527
Windows 8.1 for x64-based systemsCritical5004958Security OnlyCVE-2021-34527
Windows 8.1 for 32-bit systemsCritical5004954Monthly RollupCVE-2021-34527
Windows 8.1 for 32-bit systemsCritical5004958Security OnlyCVE-2021-34527
Windows 7 for x64-based Systems Service Pack 1Critical5004953Monthly RollupCVE-2021-34527
Windows 7 for x64-based Systems Service Pack 1Critical5004951Security OnlyCVE-2021-34527
Windows 7 for 32-bit Systems Service Pack 1Critical5004953Monthly RollupCVE-2021-34527
Windows 7 for 32-bit Systems Service Pack 1Critical5004951Security OnlyCVE-2021-34527
Windows Server 2016 (Server Core installation)Critical5004948Security UpdateCVE-2021-34527
Windows Server 2016Critical5004948Security UpdateCVE-2021-34527
Windows 10 Version 1607 for x64-based SystemsCritical5004948Security UpdateCVE-2021-34527
Windows 10 Version 1607 for 32-bit SystemsCritical5004948Security UpdateCVE-2021-34527
Windows 10 for x64-based SystemsCritical5004950Security UpdateCVE-2021-34527
Windows 10 for 32-bit SystemsCritical5004950Security UpdateCVE-2021-34527
Windows Server, version 20H2 (Server Core Installation)Critical5004945Security UpdateCVE-2021-34527
Windows 10 Version 20H2 for ARM64-based SystemsCritical5004945Security UpdateCVE-2021-34527
Windows 10 Version 20H2 for 32-bit SystemsCritical5004945Security UpdateCVE-2021-34527
Windows 10 Version 20H2 for x64-based SystemsCritical5004945Security UpdateCVE-2021-34527
Windows Server, version 2004 (Server Core installation)Critical5004945Security UpdateCVE-2021-34527
Windows 10 Version 2004 for x64-based SystemsCritical5004945Security UpdateCVE-2021-34527
Windows 10 Version 2004 for ARM64-based SystemsCritical5004945Security UpdateCVE-2021-34527
Windows 10 Version 2004 for 32-bit SystemsCritical5004945Security UpdateCVE-2021-34527
Windows 10 Version 21H1 for 32-bit SystemsCritical5004945Security UpdateCVE-2021-34527
Windows 10 Version 21H1 for ARM64-based SystemsCritical5004945Security UpdateCVE-2021-34527
Windows 10 Version 21H1 for x64-based SystemsCritical5004945Security UpdateCVE-2021-34527
Windows 10 Version 1909 for ARM64-based SystemsCritical5004946Security UpdateCVE-2021-34527
Windows 10 Version 1909 for x64-based SystemsCritical5004946Security UpdateCVE-2021-34527
Windows 10 Version 1909 for 32-bit SystemsCritical5004946Security UpdateCVE-2021-34527
Windows Server 2019 (Server Core installation)Critical5004947Security UpdateCVE-2021-34527
Windows Server 2019Critical5004947Security UpdateCVE-2021-34527
Windows 10 Version 1809 for ARM64-based SystemsCritical5004947Security UpdateCVE-2021-34527
Windows 10 Version 1809 for x64-based SystemsCritical5004947Security UpdateCVE-2021-34527
Windows 10 Version 1809 for 32-bit SystemsCritical5004947Security UpdateCVE-2021-34527

Security Updates Liste PrintNightmare

Der Patch schützt, wenn folgende Richtlinie nicht konfiguriert ist.

Point-and-Print-Einschränken Nightmare

Diese Registry-Schlüssel, wenn vorhanden müssen den Wert 0 = aufweisen. Sind die Schlüssel nicht vorhanden schützt der Patch ebenfalls!

HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows NT\Printers\PointAndPrint
DWORD-Wert (32-Bit)
NoWarningNoElevationOnInstall = 0
UpdatePromptSettings = 0

Stehen die Werte auf = 1 weichen diese Einstellung vom Standard ab, und der Patch schützt nicht!