Microsoft Windows Print Spooler PrintNightmare Remote Code Execution Exploit

The vulnerability has been dubbed PrintNightmare and is tracked as CVE-2021-34527. The flaw is due to the Windows Print Spooler service improperly performing privileged file operations. Microsoft says the flaw can be exploited by an authenticated user calling RpcAddPrinterDriverEx(). When exploited, an attacker gains SYSTEM privileges and can execute arbitrary code, install programs, view, change, or delete data or create new accounts with full user rights.

This update adds the ability to choose an external agent for the smb file share.

It adds more connexion methods and pivoting support.

It adds the ability to login using an identity.

It warns when the target can be patched or not to be vulnerable.
Exploit Platform
Exploit Type
Product Name