CVE ID | |
CVSS SCORE | 7.5, AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H |
AFFECTED VENDORS |
Microsoft |
AFFECTED PRODUCTS |
PowerShell |
VULNERABILITY DETAILS |
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Microsoft PowerShell. Interaction with this library is required to exploit this vulnerability but attack vectors may vary depending on the implementation. The specific flaw exists within the TryModuleAutoLoading method. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to execute code in the context of the current process. |
ADDITIONAL DETAILS |
02/21/24 – ZDI reported the vulnerability to the vendor. -- Mitigation: Given the nature of the vulnerability, the only salient mitigation strategy is to restrict interaction with the product. |
DISCLOSURE TIMELINE |
|
CREDIT | Piotr Bazydlo (@chudypb) of Trend Micro Zero Day Initiative |