Microsoft warned Windows users about vulnerabilities in the Windows Print Spooler service. Both vulnerabilities can be used by an attacker with a regular user account to take control of a vulnerable server or client machine. Kaspersky products protect against attacks leveraging these vulnerabilities. The local version of PrintNightmare uses the same method for exploitation as CVE-2021-34527, but theres a difference in the entrypoint function (AddPrinterDriverEx) This means an attacker can place a malicious DLL in any locally accessible directory to run the exploit.”]
Source: https://securelist.com/quick-look-at-cve-2021-1675-cve-2021-34527-aka-printnightmare/103123/