### [CVE-2021-1675](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1675) ![](https://img.shields.io/static/v1?label=Product&message=Windows%2010%20Version%201507&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=Windows%2010%20Version%201607&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=Windows%2010%20Version%201809&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=Windows%2010%20Version%201909&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=Windows%2010%20Version%202004&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=Windows%2010%20Version%2020H2&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=Windows%2010%20Version%2021H1&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=Windows%207%20Service%20Pack%201&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=Windows%207&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=Windows%208.1&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=Windows%20Server%202008%20%20Service%20Pack%202&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=Windows%20Server%202008%20R2%20Service%20Pack%201%20(Server%20Core%20installation)&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=Windows%20Server%202008%20R2%20Service%20Pack%201&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=Windows%20Server%202008%20Service%20Pack%202%20(Server%20Core%20installation)&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=Windows%20Server%202008%20Service%20Pack%202&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=Windows%20Server%202012%20(Server%20Core%20installation)&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=Windows%20Server%202012%20R2%20(Server%20Core%20installation)&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=Windows%20Server%202012%20R2&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=Windows%20Server%202012&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=Windows%20Server%202016%20(Server%20Core%20installation)&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=Windows%20Server%202016&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=Windows%20Server%202019%20(Server%20Core%20installation)&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=Windows%20Server%202019&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=Windows%20Server%20version%202004&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=Windows%20Server%20version%2020H2&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=10.0.0%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=6.0.0%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=6.1.0%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=6.2.0%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=6.3.0%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=Elevation%20of%20Privilege&color=brightgreen) ### Description Windows Print Spooler Remote Code Execution Vulnerability ### POC #### Reference - http://packetstormsecurity.com/files/163349/Microsoft-PrintNightmare-Proof-Of-Concept.html - http://packetstormsecurity.com/files/163351/PrintNightmare-Windows-Spooler-Service-Remote-Code-Execution.html - http://packetstormsecurity.com/files/167261/Print-Spooler-Remote-DLL-Injection.html #### Github - https://github.com/000Tonio/cve-2021-1675 - https://github.com/0housefly0/Printnightmare - https://github.com/0x727/usefull-elevation-of-privilege - https://github.com/0x7n6/OSCP - https://github.com/0xHunterr/OSCP-Study-Notes - https://github.com/0xHunterr/OSCP-Studying-Notes - https://github.com/0xMarcio/cve - https://github.com/0xSs0rZ/Windows_Exploit - https://github.com/0xStrygwyr/OSCP-Guide - https://github.com/0xZipp0/OSCP - https://github.com/0xaniketB/HackTheBox-Driver - https://github.com/0xffee/Layer2HackerDao - https://github.com/0xsyr0/OSCP - https://github.com/20142995/sectool - https://github.com/3gstudent/Invoke-BuildAnonymousSMBServer - https://github.com/410g0n3/Active-Directory-Cheatsheet-Attacks - https://github.com/4RG0S/2021-Summer-Some-Day-Exploit - https://github.com/5l1v3r1/CVE-2021-1675-Mitigation-For-Systems-That-Need-Spooler - https://github.com/5thphlame/OSCP-NOTES-ACTIVE-DIRECTORY-1 - https://github.com/61106960/ClipySharpPack - https://github.com/AMatheusFeitosaM/OSCP-Cheat - https://github.com/ANON-D46KPH4TOM/Active-Directory-Exploitation-Cheat-Sheets - https://github.com/ARPSyndicate/cve-scores - https://github.com/ARPSyndicate/cvemon - https://github.com/AbdullahZuhair21/OSCP-Notes - https://github.com/Aesir9/helpinghand - https://github.com/AleHelp/Windows-Pentesting-cheatsheet - https://github.com/Amar224/Active-Directory-Exploitation-Cheat-Sheet - https://github.com/AndrewTrube/CVE-2021-1675 - https://github.com/Andromeda254/cve - https://github.com/Anonymous-Family/Zero-day-scanning - https://github.com/AshikAhmed007/Active-Directory-Exploitation-Cheat-Sheet - https://github.com/B34MR/zeroscan - https://github.com/BADR0b0t33/PrintAttck - https://github.com/BC-SECURITY/Moriarty - https://github.com/BOFs/CobaltStrike - https://github.com/BeetleChunks/SpoolSploit - https://github.com/CPester05/Exploits - https://github.com/CVEDB/PoC-List - https://github.com/CVEDB/awesome-cve-repo - https://github.com/CVEDB/top - https://github.com/CharlesTheGreat77/FreddyKrueger - https://github.com/CnOxx1/CVE-2021-34527-1675 - https://github.com/Cyberappy/Sigma-rules - https://github.com/D3Ext/PentestDictionary - https://github.com/DARKSTUFF-LAB/SpoolSploit - https://github.com/DLL00P/CVE-2021-1675 - https://github.com/DanielBodnar/awesome-stars - https://github.com/DanielBodnar/my-awesome-stars - https://github.com/DenizSe/CVE-2021-34527 - https://github.com/Dr4ks/PJPT_CheatSheet - https://github.com/EASI-Sec/EasiWeapons.sh - https://github.com/EnriqueSanchezdelVillar/NotesHck - https://github.com/Faizan-Khanx/OSCP - https://github.com/Falcon712/Windows_Hardening_Project - https://github.com/G0urmetD/PJPT-Notes - https://github.com/Getshell/CobaltStrike - https://github.com/GhostTroops/TOP - https://github.com/GlacierGossip/PrintNightmare - https://github.com/Gyarbij/xknow_infosec - https://github.com/H0j3n/EzpzCheatSheet - https://github.com/HackingCost/AD_Pentest - https://github.com/HarshRajSinghania/smbvulnrecon - https://github.com/Hatcat123/my_stars - https://github.com/Iveco/xknow_infosec - https://github.com/JERRY123S/all-poc - https://github.com/JFR-C/Boot2root-CTFs-Writeups - https://github.com/JFR-C/Windows-Penetration-Testing - https://github.com/Jalexander798/JA_Tools-0xsp-Mongoose - https://github.com/Jalexander798/JA_Tools-ActiveDirectory-Exploitation - https://github.com/Jean-Francois-C/Boot2root-CTFs-Writeups - https://github.com/Jean-Francois-C/Windows-Penetration-Testing - https://github.com/JohnHammond/CVE-2021-34527 - https://github.com/JumpsecLabs/PrintNightmare - https://github.com/Kar0nX/ADtools - https://github.com/Kryo1/Pentest_Note - https://github.com/LaresLLC/CVE-2021-1675 - https://github.com/Leonidus0x10/CVE-2021-1675-SCANNER - https://github.com/Ly0nt4r/OSCP - https://github.com/MGamalCYSEC/Active-Directory-Enumeration-and-Attacks - https://github.com/Mehedi-Babu/active_directory_chtsht - https://github.com/Mikasazero/Cobalt-Strike - https://github.com/MizaruIT/PENTAD-TOOLKIT - https://github.com/MizaruIT/PENTADAY_TOOLKIT - https://github.com/Mohit0/Active-Directory-Exploitation-Cheat-Sheet - https://github.com/MolotovC2/arsenal - https://github.com/Mr-xn/Penetration_Testing_POC - https://github.com/NaInSec/CVE-PoC-in-GitHub - https://github.com/NickSanzotta/zeroscan - https://github.com/OppressionBreedsResistance/CVE-2021-1675-PrintNightmare - https://github.com/Ostorlab/KEV - https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors - https://github.com/PuddinCat/GithubRepoSpider - https://github.com/Qazeer/OffensivePythonPipeline - https://github.com/RarW0lf/PrintNightmare-BB-Payload - https://github.com/ReflectedThanatos/OSCP-cheatsheet - https://github.com/S1ckB0y1337/Active-Directory-Exploitation-Cheat-Sheet - https://github.com/S3cur3Th1sSh1t/My-starred-Repositories - https://github.com/S3cur3Th1sSh1t/PowerSharpPack - https://github.com/S3cur3Th1sSh1t/WinPwn - https://github.com/SYRTI/POC_to_review - https://github.com/SafeItConsulting/WinTools - https://github.com/SaintsConnor/Exploits - https://github.com/SantoriuHen/NotesHck - https://github.com/SecuProject/NetworkInfoGather - https://github.com/SenukDias/OSCP_cheat - https://github.com/SexurityAnalyst/WinPwn - https://github.com/SexyBeast233/SecBooks - https://github.com/SirElmard/ethical_hacking - https://github.com/SofianeHamlaoui/Conti-Clear - https://github.com/Sp4ceDogy/NPE-CS-V-CVE-2021-1675 - https://github.com/Steels03/PrintNightmare-Driver-Checker - https://github.com/T0mcat3r/ALinks - https://github.com/TheCyberFang/website - https://github.com/TheJoyOfHacking/calebstewart-CVE-2021-1675 - https://github.com/TheJoyOfHacking/cube0x0-CVE-2021-1675 - https://github.com/TheLastochka/pentest - https://github.com/TheWatchDog13/PJPT-Cheat_Sheet - https://github.com/Threekiii/Awesome-Redteam - https://github.com/TirthSharaf/Internal-Pentest-cheat-sheet - https://github.com/Tomparte/PrintNightmare - https://github.com/TrojanAZhen/Self_Back - https://github.com/VK9D/PrintNightmare - https://github.com/ViniciusClement/OSCP_2025 - https://github.com/VishuGahlyan/OSCP - https://github.com/VoiidByte/Impacket - https://github.com/WatPow/anadoc - https://github.com/WhooAmii/POC_to_review - https://github.com/WidespreadPandemic/CVE-2021-34527_ACL_mitigation - https://github.com/Winter3un/CVE-2021-1675 - https://github.com/Wra7h/SharpPN - https://github.com/X-3306/my-all-notes - https://github.com/X-The-Mystic/xframe - https://github.com/YangSirrr/YangsirStudyPlan - https://github.com/aatharvauti/AD - https://github.com/abdullah89255/Metasploit-Framework- - https://github.com/adnan-kutay-yuksel/tryhackme-all-rooms-database - https://github.com/afine-com/research - https://github.com/afinepl/research - https://github.com/akyuksel/tryhackme-all-rooms-database - https://github.com/alvesnet-oficial/microsoft-vulnerabilidades - https://github.com/alvesnet-suporte/microsoft-vulnerabilidades - https://github.com/angui0O/Awesome-Redteam - https://github.com/arifhidayat65/PrintNightmare - https://github.com/auduongxuan/CVE-2022-26809 - https://github.com/aymankhder/AD-esploitation-cheatsheet - https://github.com/aymankhder/Windows-Penetration-Testing - https://github.com/b4rtik/SharpKatz - https://github.com/bartimus-primed/CVE-2021-1675-Yara - https://github.com/bartimusprimed/CVE-2021-1675-Yara - https://github.com/bhassani/Recent-CVE - https://github.com/binganao/vulns-2022 - https://github.com/boh/RedCsharp - https://github.com/brimstone/stars - https://github.com/byt3bl33d3r/ItWasAllADream - https://github.com/calebstewart/CVE-2021-1675 - https://github.com/cfalta/MicrosoftWontFixList - https://github.com/chosenonehacks/Red-Team-tools-and-usefull-links - https://github.com/ciwen3/PNPT - https://github.com/clearbluejar/cve-markdown-charts - https://github.com/corelight/CVE-2021-1675 - https://github.com/crimsoncore/SharpKatz - https://github.com/crtaylor315/PrintNightmare-Before-Halloween - https://github.com/csb21jb/Pentesting-Notes - https://github.com/cube0x0/CVE-2021-1675 - https://github.com/cyb3rpeace/Active-Directory-Exploitation-Cheat-Sheet - https://github.com/cyb3rpeace/CVE-2021-34527 - https://github.com/cyberanand1337x/bug-bounty-2022 - https://github.com/cyberfreaq/configs - https://github.com/cyberfreaq/kali-prep - https://github.com/cybersecurityworks553/CVE-2021-1675_PrintNightMare - https://github.com/cycoslave/ITSec-toolkit - https://github.com/d0nkeyk0ng787/PrintNightmare-POC - https://github.com/danielbodnar/my-awesome-stars - https://github.com/demilson/spoolsv - https://github.com/devkw/PentestDictionary - https://github.com/drerx/Active-Directory-Exploitation-Cheat-Sheet - https://github.com/dxnboy/redteam - https://github.com/e-hakson/OSCP - https://github.com/edisonrivera/HackTheBox - https://github.com/edsonjt81/CVE-2021-1675 - https://github.com/edsonjt81/SpoolSploit - https://github.com/elinakrmova/Active-Directory-Exploitation-Cheat-Sheet - https://github.com/elinakrmova/WinPwn - https://github.com/eljosep/OSCP-Guide - https://github.com/emtee40/win-pwn - https://github.com/eng-amarante/CyberSecurity - https://github.com/eversinc33/NimNightmare - https://github.com/evilashz/CVE-2021-1675-LPE-EXP - https://github.com/exfilt/CheatSheet - https://github.com/exploitblizzard/PrintNightmare-CVE-2021-1675 - https://github.com/f4T1H21/HackTheBox-Writeups - https://github.com/fazilbaig1/oscp - https://github.com/fei9747/Awesome-CobaltStrike - https://github.com/galoget/PrintNightmare-CVE-2021-1675-CVE-2021-34527 - https://github.com/gecr07/HTB-Academy - https://github.com/getanehAl/Windows-Penetration-Testing - https://github.com/giterlizzi/secdb-feeds - https://github.com/gohrenberg/CVE-2021-1675-Mitigation-For-Systems-That-Need-Spooler - https://github.com/goldenscale/GS_GithubMirror - https://github.com/gyaansastra/Print-Nightmare-LPE - https://github.com/hack-parthsharma/RedTeam-Cheetsheet - https://github.com/hack-parthsharma/WinPwn - https://github.com/hahaleyile/my-CVE-2021-1675 - https://github.com/hegusung/netscan - https://github.com/hktalent/TOP - https://github.com/hlldz/CVE-2021-1675-LPE - https://github.com/huike007/penetration_poc - https://github.com/huisetiankong478/penetration_poc - https://github.com/iamramahibrah/AD-Attacks-and-Defend - https://github.com/initconf/cve-2021-1675-printnightmare - https://github.com/izj007/wechat - https://github.com/jbmihoub/all-poc - https://github.com/jenriquezv/OSCP-Cheat-Sheets-AD - https://github.com/jitmondal1/OSCP - https://github.com/jj4152/cve-2021-1675 - https://github.com/jor6PS/ad-from-0-to-Hero - https://github.com/k0imet/CVE-POCs - https://github.com/k0mi-tg/CVE-POC - https://github.com/k8gege/CVE-2021-40444 - https://github.com/k8gege/Ladon - https://github.com/k8gege/cve-2021-1675 - https://github.com/kdandy/WinPwn - https://github.com/kgwanjala/oscp-cheatsheet - https://github.com/khansiddique/VulnHub-Boot2root-CTFs-Writeups - https://github.com/killtr0/CVE-2021-1675-PrintNightmare - https://github.com/kondah/patch-cve-2021-1675 - https://github.com/kougyokugentou/CVE-2021-1675 - https://github.com/laoqin1234/https-github.com-HackingCost-AD_Pentest - https://github.com/lawbyte/Windows-and-Active-Directory - https://github.com/lawrenceamer/0xsp-Mongoose - https://github.com/lions2012/Penetration_Testing_POC - https://github.com/lvoxpq/aaaxxqqq - https://github.com/ly4k/PrintNightmare - https://github.com/lyshark/Windows-exploits - https://github.com/m8sec/CVE-2021-34527 - https://github.com/mahdictf/PrivEsc-Techniques - https://github.com/malwaremily/infosec-news-briefs - https://github.com/manas3c/CVE-POC - https://github.com/mayormaier/printnightmare-fixes - https://github.com/mdecrevoisier/EVTX-to-MITRE-Attack - https://github.com/mdecrevoisier/SIGMA-detection-rules - https://github.com/melons135/DagdaBins - https://github.com/merlinepedra/CobaltStrike - https://github.com/merlinepedra/POWERSHARPPACK - https://github.com/merlinepedra/SpoolSploit - https://github.com/merlinepedra25/CobaltStrike - https://github.com/merlinepedra25/POWERSHARPPACK - https://github.com/merlinepedra25/SpoolSploit - https://github.com/morkin1792/security-tests - https://github.com/mranv/adPentest - https://github.com/mrezqi/CVE-2021-1675_CarbonBlack_HuntingQuery - https://github.com/mstxq17/CVE-2021-1675_RDL_LPE - https://github.com/mxdelta/Up_Privel_windows - https://github.com/n0-traces/cve_monitor - https://github.com/n0rmh3ll/AD-checklist - https://github.com/n1sh1th/CVE-POC - https://github.com/nathanealm/PrintNightmare-Exploit - https://github.com/naujpr/printnightmare - https://github.com/nemo-wq/PrintNightmare-CVE-2021-34527 - https://github.com/netkid123/WinPwn-1 - https://github.com/nholuongut/active-directory-exploitation-cheat-sheet - https://github.com/nitishbadole/oscp-note-3 - https://github.com/nomi-sec/PoC-in-GitHub - https://github.com/nullx3d/PaypScan - https://github.com/numanturle/PrintNightmare - https://github.com/orgTestCodacy11KRepos110MB/repo-9265-PowerSharpPack - https://github.com/oscpname/AD_PowerSharpPack - https://github.com/oscpname/OSCP_cheat - https://github.com/outflanknl/PrintNightmare - https://github.com/ozergoker/PrintNightmare - https://github.com/ozzy76/cveCheck - https://github.com/parth45/cheatsheet - https://github.com/peckre/PNCVE-Win10-20H2-Exploit - https://github.com/penetrarnya-tm/WeaponizeKali.sh - https://github.com/plzheheplztrying/cve_monitor - https://github.com/ptter23/CVE-2021-1675 - https://github.com/puckiestyle/CVE-2021-1675 - https://github.com/pwninx/WinPwn - https://github.com/pwnlog/ALinks - https://github.com/pwnlog/PAD - https://github.com/pwnlog/PuroAD - https://github.com/pwnlog/PurpAD - https://github.com/r1skkam/PrintNightmare - https://github.com/raithedavion/PrintNightmare - https://github.com/rajbhx/Active-Directory-Exploitation-Cheat-Sheet - https://github.com/real-acmkan/docker-printernightmare - https://github.com/retr0-13/Active-Directory-Exploitation-Cheat-Sheet - https://github.com/retr0-13/PrintNightmare - https://github.com/retr0-13/WinPwn - https://github.com/rettbl/Useful - https://github.com/revanmalang/OSCP - https://github.com/rnbochsr/atlas - https://github.com/rodrigosilvaluz/JUST_WALKING_DOG - https://github.com/rumputliar/Active-Directory-Exploitation-Cheat-Sheet - https://github.com/s3mPr1linux/JUST_WALKING_DOG - https://github.com/sabrinalupsan/pentesting-active-directory - https://github.com/sailay1996/PrintNightmare-LPE - https://github.com/sardarahmed705/Pentest-Dictionary - https://github.com/saurav2shukla/vulnerabilitiesPoC - https://github.com/schecthellraiser606/oscp_cheet - https://github.com/schecthellraiser606/pentest_cheet - https://github.com/seeu-inspace/easyg - https://github.com/sh7alward/CVE-20121-34527-nightmare - https://github.com/shadowdevnotreal/Awesome-CobaltStrike - https://github.com/sinfulz/JustGetDA - https://github.com/snovvcrash/WeaponizeKali.sh - https://github.com/soosmile/POC - https://github.com/sponkmonk/Ladon_english_update - https://github.com/strikoder/CTFS - https://github.com/suljov/Windows-and-Active-Directory - https://github.com/suljov/Windwos-and-Active-Directory - https://github.com/suljov/suljov-Pentest-ctf-cheat-sheet - https://github.com/taielab/awesome-hacking-lists - https://github.com/tanarchytan/CVE-2021-1675 - https://github.com/thalpius/Microsoft-CVE-2021-1675 - https://github.com/thomasgeens/CVE-2021-1675 - https://github.com/tomatimmy/AD-attack-enumerate - https://github.com/trganda/starrlist - https://github.com/trhacknon/Pocingit - https://github.com/trixiahorner/printnightmare-try-hack-me - https://github.com/trixiahorner/trixiahorner - https://github.com/txuswashere/OSCP - https://github.com/txuswashere/Pentesting-Windows - https://github.com/uhub/awesome-c-sharp - https://github.com/uk32htb/Active-Directory - https://github.com/undefined-name12/Cheat-Sheet-Active-Directory - https://github.com/vanhohen/ADNinja - https://github.com/weeka10/-hktalent-TOP - https://github.com/whoami-chmod777/CVE-2021-1675---PrintNightmare-LPE-PowerShell- - https://github.com/whoami-chmod777/CVE-2021-1675-CVE-2021-34527 - https://github.com/whoami13apt/files2 - https://github.com/whoforget/CVE-POC - https://github.com/winterwolf32/CVE-S---Penetration_Testing_POC- - https://github.com/wlfrag/printnightmare - https://github.com/wowter-code/PowerSharpPack - https://github.com/wsummerhill/CobaltStrike_RedTeam_CheatSheet - https://github.com/xbufu/PrintNightmareCheck - https://github.com/xhref/OSCP - https://github.com/xthemystik/xframe - https://github.com/xuetusummer/Penetration_Testing_POC - https://github.com/yerdaulete/PJPT-CheatSheet - https://github.com/yigitturak/Forensics - https://github.com/youwizard/CVE-POC - https://github.com/yovelo98/OSCP-Cheatsheet - https://github.com/yu2u/CVE-2021-1675 - https://github.com/zecool/cve - https://github.com/zer0yu/Awesome-CobaltStrike - https://github.com/zeze-zeze/2021iThome - https://github.com/zha0/Microsoft-CVE-2021-1675 - https://github.com/zux0x3a/0xsp-Mongoose