Official patches for CVE-2021-34527 have not been released yet. However, 0patch has released an update that can keep you going till the release of an official one. The Print Spooler vulnerability allows threat actors to view, amend, or delete programs, install programs, and create new user accounts.
By persuading a victim to open specially-crafted content, an attacker could exploit this vulnerability to execute arbitrary code on the system with SYSTEM privileges.
Microsoft has released prevention and mitigation measures for the vulnerability until they come up with an official fix. Microsoft is urging people to disable the printing service on all Active Directory and Domain Controllers with the service enabled.
Disable the Print Spooler service
If disabling the Print Spooler service is appropriate for your enterprise, use the following PowerShell commands:
Stop-Service -Name Spooler -Force
Set-Service -Name Spooler -StartupType Disabled
Disable inbound remote printing through Group Policy
You can also configure the settings via Group Policy as follows: Computer Configuration / Administrative Templates / Printers
Disable the “Allow Print Spooler to accept client connections:” policy to block remote attacks.
Refer to 0patch for patch information.