Логотип exploitDog
bind:CVE-2020-16886
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2020-16886

Количество 4

Количество 4

nvd логотип

CVE-2020-16886

больше 5 лет назад

<p>A security feature bypass vulnerability exists in the PowerShellGet V2 module. An attacker who successfully exploited this vulnerability could bypass WDAC (Windows Defender Application Control) policy and execute arbitrary code on a policy locked-down machine.</p> <p>An attacker must have administrator privileges to create a configuration that includes installing PowerShellGet V2 module onto a machine from the PowerShell Gallery. The WDAC policy must be configured to allow the module to run. After this is done, PowerShell script can be injected and run fully trusted, allowing the attacker arbitrary code execution on the machine.</p> <p>The update addresses the vulnerability by changing how URLs are processed.</p>

CVSS3: 5.3
EPSS: Низкий
msrc логотип

CVE-2020-16886

больше 5 лет назад

PowerShellGet Module WDAC Security Feature Bypass Vulnerability

CVSS3: 5.3
EPSS: Низкий
github логотип

GHSA-xp2m-r7f6-m54m

больше 3 лет назад

A security feature bypass vulnerability exists in the PowerShellGet V2 module, aka 'PowerShellGet Module WDAC Security Feature Bypass Vulnerability'.

CVSS3: 5.3
EPSS: Низкий
fstec логотип

BDU:2020-04902

больше 5 лет назад

Уязвимость модуля PowerShellGet интерпретатора команд PowerShell операционной системы Windows, связанная с недостатками механизмов безопасности, позволяющая нарушителю выполнить произвольный код

CVSS3: 6.7
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2020-16886

<p>A security feature bypass vulnerability exists in the PowerShellGet V2 module. An attacker who successfully exploited this vulnerability could bypass WDAC (Windows Defender Application Control) policy and execute arbitrary code on a policy locked-down machine.</p> <p>An attacker must have administrator privileges to create a configuration that includes installing PowerShellGet V2 module onto a machine from the PowerShell Gallery. The WDAC policy must be configured to allow the module to run. After this is done, PowerShell script can be injected and run fully trusted, allowing the attacker arbitrary code execution on the machine.</p> <p>The update addresses the vulnerability by changing how URLs are processed.</p>

CVSS3: 5.3
0%
Низкий
больше 5 лет назад
msrc логотип
CVE-2020-16886

PowerShellGet Module WDAC Security Feature Bypass Vulnerability

CVSS3: 5.3
0%
Низкий
больше 5 лет назад
github логотип
GHSA-xp2m-r7f6-m54m

A security feature bypass vulnerability exists in the PowerShellGet V2 module, aka 'PowerShellGet Module WDAC Security Feature Bypass Vulnerability'.

CVSS3: 5.3
0%
Низкий
больше 3 лет назад
fstec логотип
BDU:2020-04902

Уязвимость модуля PowerShellGet интерпретатора команд PowerShell операционной системы Windows, связанная с недостатками механизмов безопасности, позволяющая нарушителю выполнить произвольный код

CVSS3: 6.7
0%
Низкий
больше 5 лет назад

Уязвимостей на страницу