Patch
CVE-2021-34527
with vRx
The following script has 2 options first option is to disable the spooler services if it's not used according to the admin choice, And the 2nd option is to apply mitigations by checking for some register keys that helps in reduce and mitigate the exploitation of the vulnerability such as "\Software\Policies\Microsoft\Windows NT\Printers\PointAndPrint\RestrictDriverInstallationToAdministrators" which is determine whether only administrators can install printer drivers that are not digitally signed. "\Software\Policies\Microsoft\Windows NT\Printers\PointAndPrint\NoElevationOnInstall" Which is determine whether Point and Print installations for printer drivers require elevated permissions, "\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA" Which is determine whether User Account Control (UAC) prompts for consent or credentials are displayed for all users when executing applications that require administrator permissions. Note: Run script as admin.
Read more
Read less
Patch faster and smarter
with vRx
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Trusted by 600+ customers:




Solution
Remediate faster with vRx
Patch Management
vRx automatically deploys patches across all systems, cutting patching time by 80%.
Scripting Engine
vRx’s scripting engine solves complex vulnerabilities, like log4j, with built-in or custom scripts.
Patchless Protection
vRx’s Patchless Protection secures vulnerable apps and reduces risk while maintaining functionality.

Automated Patching, Scripting, and more
Talk with our team to get a personal walkthrough
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.