Windows PowerShell Command Injection Vulnerability

HIGH (7.8)

Threat Intelligence

⚠️ CRITICAL GAP - Exploits exist but no detection available
EPSS Score: 0.17% chance of exploitation (percentile: 38%)
🔍 Detection Tools: None available in major open-source tools
⚔️ Exploit Availability: GitHub PoC

How we test →

What is it?

Windows PowerShell is a task automation and configuration management framework from Microsoft. This vulnerability allows an attacker to execute arbitrary code locally on the target system by manipulating special elements in Windows PowerShell commands, which are not properly neutralized.

Am I affected?

You're affected if you use Improper neutralization of special elements used. Specific version info not stated in the advisory.

How to fix

To fix this vulnerability, Microsoft recommends enabling the "Execution Policy" to restrict the execution of scripts. You can do this by running the following command in PowerShell:

Set-ExecutionPolicy RemoteSigned -Force

Alternatively, you can use the Windows Defender Security Center to configure the Execution Policy.

References