Skip to main content

CVE-2023-36013: CWE-798: Use of Hard-coded Credentials in Microsoft PowerShell 7.2

Medium
VulnerabilityCVE-2023-36013cvecve-2023-36013cwe-798
Published: Mon Nov 20 2023 (11/20/2023, 16:02:37 UTC)
Source: CVE
Vendor/Project: Microsoft
Product: PowerShell 7.2

Description

PowerShell Information Disclosure Vulnerability

AI-Powered Analysis

AILast updated: 06/25/2025, 05:07:07 UTC

Technical Analysis

CVE-2023-36013 is a vulnerability identified in Microsoft PowerShell version 7.2.0, categorized under CWE-798, which pertains to the use of hard-coded credentials within the software. This vulnerability allows an attacker with network access and low privileges (PR:L) to remotely exploit the flaw without requiring user interaction (UI:N). The vulnerability results in information disclosure, specifically exposing sensitive credentials embedded in the PowerShell 7.2.0 codebase. The CVSS 3.1 base score is 6.5, indicating a medium severity level. The attack vector is network-based (AV:N), and the attack complexity is low (AC:L), meaning exploitation does not require specialized conditions. The scope remains unchanged (S:U), and the impact is primarily on confidentiality (C:H), with no impact on integrity (I:N) or availability (A:N). The vulnerability does not require user interaction and can be exploited remotely by an attacker who already has some level of privileges on the target system. No known exploits are currently reported in the wild, and no patches have been published yet. The presence of hard-coded credentials in PowerShell 7.2.0 could allow attackers to gain unauthorized access to sensitive information or escalate privileges within affected environments, potentially undermining trust in automation and scripting tasks that rely on PowerShell. Given PowerShell's widespread use in system administration and automation, this vulnerability poses a significant risk if left unmitigated.

Potential Impact

For European organizations, the impact of CVE-2023-36013 could be substantial, especially for enterprises and public sector entities that rely heavily on PowerShell 7.2 for automation, configuration management, and operational tasks. The disclosure of hard-coded credentials can lead to unauthorized access to internal systems, data leakage, and lateral movement within networks. This could compromise sensitive personal data protected under GDPR, resulting in regulatory penalties and reputational damage. Critical infrastructure sectors such as finance, healthcare, energy, and government agencies are particularly at risk due to their reliance on PowerShell for automation and orchestration. The vulnerability could facilitate targeted attacks by threat actors aiming to exploit these credentials to gain footholds in networks, conduct espionage, or disrupt operations. Since the vulnerability does not require user interaction and can be exploited remotely, it increases the attack surface and the urgency for mitigation. Although no known exploits are currently active, the medium severity rating and ease of exploitation suggest that attackers may develop exploits in the near future, increasing risk for European organizations.

Mitigation Recommendations

1. Immediate mitigation should include auditing all systems running PowerShell 7.2.0 to identify affected installations. 2. Where possible, downgrade to earlier, unaffected versions of PowerShell or upgrade to a later patched version once available. 3. Implement network segmentation and restrict network access to systems running PowerShell 7.2.0 to trusted administrators only. 4. Employ application whitelisting and restrict execution policies to prevent unauthorized scripts from running. 5. Monitor logs and network traffic for unusual PowerShell activity that could indicate exploitation attempts. 6. Rotate any credentials that may have been exposed or are suspected to be hard-coded in scripts or automation workflows. 7. Use endpoint detection and response (EDR) tools to detect anomalous behavior related to PowerShell usage. 8. Engage with Microsoft support channels to obtain patches or workarounds as they become available. 9. Educate system administrators and DevOps teams about the risks of hard-coded credentials and encourage the use of secure credential management solutions such as Azure Key Vault or other secrets management tools. 10. Conduct penetration testing focused on PowerShell environments to identify potential exploitation paths and validate mitigation effectiveness.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2023-06-20T20:44:39.822Z
Cisa Enriched
false
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d983bc4522896dcbee41d

Added to database: 5/21/2025, 9:09:15 AM

Last enriched: 6/25/2025, 5:07:07 AM

Last updated: 8/11/2025, 11:56:52 PM

Views: 17

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats