Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2023-36013: CWE-798: Use of Hard-coded Credentials in Microsoft PowerShell 7.2

0
Medium
VulnerabilityCVE-2023-36013cvecve-2023-36013cwe-798
Published: Mon Nov 20 2023 (11/20/2023, 16:02:37 UTC)
Source: CVE
Vendor/Project: Microsoft
Product: PowerShell 7.2

Description

PowerShell Information Disclosure Vulnerability

AI-Powered Analysis

AILast updated: 10/09/2025, 00:16:54 UTC

Technical Analysis

CVE-2023-36013 is a vulnerability classified under CWE-798, indicating the use of hard-coded credentials within Microsoft PowerShell version 7.2.0. This flaw results in an information disclosure vulnerability where sensitive credential data embedded in the PowerShell environment can be accessed by an attacker. The vulnerability requires the attacker to have network access and low privileges (PR:L) but does not require user interaction (UI:N). The attack vector is network-based (AV:N), and the scope remains unchanged (S:U), meaning the impact is confined to the vulnerable component. The confidentiality impact is high (C:H), as exposure of hard-coded credentials can lead to unauthorized access to systems or services. However, integrity and availability are not affected (I:N/A:N). The CVSS score is 6.5, reflecting a medium severity level. No known exploits have been reported in the wild, and no official patches have been linked yet. The vulnerability highlights a critical security practice failure—embedding static credentials in code—which can be leveraged by attackers to escalate privileges or move laterally within a network. PowerShell 7.2 is widely used for automation, scripting, and management tasks across enterprise environments, increasing the risk surface if this vulnerability is exploited.

Potential Impact

For European organizations, the exposure of hard-coded credentials in PowerShell 7.2.0 can lead to unauthorized access to sensitive systems and data, undermining confidentiality and potentially enabling further attacks such as privilege escalation or lateral movement within networks. Organizations relying heavily on PowerShell for automation, especially in sectors like finance, energy, telecommunications, and government, face increased risk. The breach of credentials could compromise critical infrastructure and sensitive information, leading to regulatory compliance issues under GDPR due to data exposure. Although the vulnerability does not directly affect system integrity or availability, the indirect consequences of credential theft can be severe, including data breaches and operational disruptions. The lack of known exploits currently reduces immediate risk but also means organizations must act proactively before attackers develop weaponized exploits.

Mitigation Recommendations

1. Monitor for and apply official patches or updates from Microsoft as soon as they become available for PowerShell 7.2. 2. Conduct a thorough audit of all PowerShell scripts and modules to identify and remove any hard-coded credentials. Replace static credentials with secure vault solutions such as Azure Key Vault or Windows Credential Manager. 3. Restrict network access to PowerShell remoting endpoints using firewalls and network segmentation to limit exposure to trusted hosts only. 4. Implement strict access controls and least privilege principles for accounts that can execute PowerShell scripts. 5. Enable logging and monitoring of PowerShell activity to detect unusual or unauthorized access attempts. 6. Educate developers and administrators on secure coding practices to avoid embedding credentials in code. 7. Consider deploying application control policies to restrict execution of unauthorized or untrusted PowerShell scripts. 8. Use multi-factor authentication (MFA) on accounts with PowerShell access to reduce the risk of credential misuse.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2023-06-20T20:44:39.822Z
Cisa Enriched
false
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d983bc4522896dcbee41d

Added to database: 5/21/2025, 9:09:15 AM

Last enriched: 10/9/2025, 12:16:54 AM

Last updated: 12/3/2025, 4:16:20 AM

Views: 38

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats