<p>A security feature bypass vulnerability exists in Windows Defender Application Control (WDAC) which could allow an malicious user to bypass WDAC enforcement. An attacker who successfully exploited this vulnerability could execute PowerShell commands that would be blocked by WDAC.</p> <p>To exploit the vulnerability, an attacker need administrator access on a local machine where PowerShell is running. The attacker could then connect to a PowerShell session and send commands to execute arbitrary code.</p> <p>The update addresses the vulnerability by correcting how PowerShell commands are validated when WDAC protection is enabled.</p>
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
microsoft windows 10 1607 |
||
microsoft windows server 2016 - |
||
microsoft windows 10 1709 |
||
microsoft windows 10 1803 |
||
microsoft windows server 2019 - |
||
microsoft windows 10 1809 |
||
microsoft windows server 2016 1903 |
||
microsoft windows 10 1903 |
||
microsoft windows server 2016 1909 |
||
microsoft windows 10 1909 |
||
microsoft windows 10 2004 |
||
microsoft windows server 2016 2004 |
||
microsoft powershell |
||
microsoft powershell 7.0.8 |