Risk | Low |
Patch available | YES |
Number of vulnerabilities | 1 |
CVE-ID | CVE-2020-16886 |
CWE-ID | CWE-254 |
Exploitation vector | Local |
Public exploit | N/A |
Vulnerable software Subscribe |
PowerShellGet Other software / Other software solutions |
Vendor | Microsoft |
Security Bulletin
This security bulletin contains one low risk vulnerability.
EUVDB-ID: #VU47622
Risk: Low
CVSSv3.1:
CVE-ID: CVE-2020-16886
CWE-ID:
CWE-254 - Security Features
Exploit availability: No
DescriptionThis vulnerability allows a local user to bypass security rescritions feature.
The vulnerability exists due to a security feature bypass issue in the PowerShellGet V2 module. A local user can bypass WDAC (Windows Defender Application Control) policy and execute arbitrary code on a policy locked-down machine.
MitigationInstall updates from vendor's website.
Vulnerable software versionsPowerShellGet: 2.2.5 - 2.2.5
CPE2.3 External linkshttp://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-16886
Q & A
Can this vulnerability be exploited remotely?
Is there known malware, which exploits this vulnerability?