Microsoft urges Admin to patch PowerShell vulnerability on Windows
By bypassing WDAC, hackers can access user credentials in unencrypted text.
WDAC is designed to protect Windows devices from potentially malicious code by ensuring that only trusted applications and drivers can run. As a result, it prevents malicious software from launching on Windows.
When software-based WDAC security is enabled on Windows, PowerShell automatically goes into restricted language mode and restricts access to only allowing access to a certain set of Windows APIs.
By exploiting the WDAC bypass with vulnerability CVE-2020-0951, hackers can circumvent this system's limited list. From there, they can execute PowerShell commands without being blocked.
"To exploit the vulnerability, an attacker needs Admin access on the local computer where PowerShell is running. The hacker can then connect to a PowerShell session and send commands to execute arbitrary code," Microsoft shared.
The second vulnerability, assigned code CVE-2021-41355, is a disclosure vulnerability in .NET Core. It makes it possible for users' credentials to be leaked as plain text on devices running non-Windows platforms.
How to check if you are affected
The vulnerability CVE-2020-0951 affects both PowerShell 7 and PowerShell 7.1, while CVE-2021-41355 affects only PowerShell 7.1.
To check which version of PowerShell you are using you can execute the command pwsh -v from Command Prompt.
Microsoft shared that there are currently no mitigations that can prevent the exploitation of these vulnerabilities. Therefore, the software giant urges Admins to soon update PowerShell 7.0.8 and 7.1.5 for PowerShell 7 and PowerShell 7.1 respectively to protect the system from potential attacks.
You should read it
- Next time, Microsoft will release PowerShell updates via Windows Update Windows
- How to Install or Update PowerShell on Windows 11
- Use PowerShell to download any file on Windows 10
- How to check PowerShell version in Windows 10
- What is PowerShell Basic commands in PowerShell
- PowerShell command in Windows
- How to use PowerShell's default parameter to change the command behavior
- Now you can run PowerShell on both Linux and macOS
May be interested
- Detects a vulnerability that threatens all Windows computers shipped from 2012 up to nowsecurity researchers have found a vulnerability in the microsoft windows platform binary table (wpbt). this vulnerability can be exploited by hackers to install rootkits on all windows computers shipped from 2012 to the present.
- Microsoft admits a new zero-day vulnerability threatens millions of Windows usersaccording to microsoft, this new zero-day vulnerability affects all versions of windows from windows 7 to windows 10 and corresponding versions of windows server.
- Risk of ransomware infection when downloading crack software onlineresearchers from cybersecurity firm sophos have discovered another malicious code distribution network hiding in the shadow of cracked software. because of wanting to use software without paying royalties, many people have become victims of cybercrime.
- Steps to enable WireGuard on ProtonVPNwireguard is a relatively new, lightweight and efficient protocol that improves your browsing experience. luckily, the developers have provided you with a way to manually switch between vpn protocols.
- Is a decentralized VPN more secure than a regular VPN?decentralized vpns provide better connection security and could change the way we browse the internet. commonly known as dvpn, a decentralized vpn provides a secure internet connection run by a network of nodes that can be servers, laptops, phones, or even desktop computers.
- How to use ZoneAlarm?zonealarm free firewall is one of the best and easiest to use programs to protect your computer from online threats. firewalls are an effective tool against bad guys trying to get into your computer and use your personal information.