CVE-2023-36013: CWE-798: Use of Hard-coded Credentials in Microsoft PowerShell 7.2
PowerShell Information Disclosure Vulnerability
AI Analysis
Technical Summary
CVE-2023-36013 is a vulnerability identified in Microsoft PowerShell version 7.2.0, categorized under CWE-798, which pertains to the use of hard-coded credentials within the software. This vulnerability allows an attacker with network access and low privileges (PR:L) to remotely exploit the flaw without requiring user interaction (UI:N). The vulnerability results in information disclosure, specifically exposing sensitive credentials embedded in the PowerShell 7.2.0 codebase. The CVSS 3.1 base score is 6.5, indicating a medium severity level. The attack vector is network-based (AV:N), and the attack complexity is low (AC:L), meaning exploitation does not require specialized conditions. The scope remains unchanged (S:U), and the impact is primarily on confidentiality (C:H), with no impact on integrity (I:N) or availability (A:N). The vulnerability does not require user interaction and can be exploited remotely by an attacker who already has some level of privileges on the target system. No known exploits are currently reported in the wild, and no patches have been published yet. The presence of hard-coded credentials in PowerShell 7.2.0 could allow attackers to gain unauthorized access to sensitive information or escalate privileges within affected environments, potentially undermining trust in automation and scripting tasks that rely on PowerShell. Given PowerShell's widespread use in system administration and automation, this vulnerability poses a significant risk if left unmitigated.
Potential Impact
For European organizations, the impact of CVE-2023-36013 could be substantial, especially for enterprises and public sector entities that rely heavily on PowerShell 7.2 for automation, configuration management, and operational tasks. The disclosure of hard-coded credentials can lead to unauthorized access to internal systems, data leakage, and lateral movement within networks. This could compromise sensitive personal data protected under GDPR, resulting in regulatory penalties and reputational damage. Critical infrastructure sectors such as finance, healthcare, energy, and government agencies are particularly at risk due to their reliance on PowerShell for automation and orchestration. The vulnerability could facilitate targeted attacks by threat actors aiming to exploit these credentials to gain footholds in networks, conduct espionage, or disrupt operations. Since the vulnerability does not require user interaction and can be exploited remotely, it increases the attack surface and the urgency for mitigation. Although no known exploits are currently active, the medium severity rating and ease of exploitation suggest that attackers may develop exploits in the near future, increasing risk for European organizations.
Mitigation Recommendations
1. Immediate mitigation should include auditing all systems running PowerShell 7.2.0 to identify affected installations. 2. Where possible, downgrade to earlier, unaffected versions of PowerShell or upgrade to a later patched version once available. 3. Implement network segmentation and restrict network access to systems running PowerShell 7.2.0 to trusted administrators only. 4. Employ application whitelisting and restrict execution policies to prevent unauthorized scripts from running. 5. Monitor logs and network traffic for unusual PowerShell activity that could indicate exploitation attempts. 6. Rotate any credentials that may have been exposed or are suspected to be hard-coded in scripts or automation workflows. 7. Use endpoint detection and response (EDR) tools to detect anomalous behavior related to PowerShell usage. 8. Engage with Microsoft support channels to obtain patches or workarounds as they become available. 9. Educate system administrators and DevOps teams about the risks of hard-coded credentials and encourage the use of secure credential management solutions such as Azure Key Vault or other secrets management tools. 10. Conduct penetration testing focused on PowerShell environments to identify potential exploitation paths and validate mitigation effectiveness.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden, Belgium, Finland
CVE-2023-36013: CWE-798: Use of Hard-coded Credentials in Microsoft PowerShell 7.2
Description
PowerShell Information Disclosure Vulnerability
AI-Powered Analysis
Technical Analysis
CVE-2023-36013 is a vulnerability identified in Microsoft PowerShell version 7.2.0, categorized under CWE-798, which pertains to the use of hard-coded credentials within the software. This vulnerability allows an attacker with network access and low privileges (PR:L) to remotely exploit the flaw without requiring user interaction (UI:N). The vulnerability results in information disclosure, specifically exposing sensitive credentials embedded in the PowerShell 7.2.0 codebase. The CVSS 3.1 base score is 6.5, indicating a medium severity level. The attack vector is network-based (AV:N), and the attack complexity is low (AC:L), meaning exploitation does not require specialized conditions. The scope remains unchanged (S:U), and the impact is primarily on confidentiality (C:H), with no impact on integrity (I:N) or availability (A:N). The vulnerability does not require user interaction and can be exploited remotely by an attacker who already has some level of privileges on the target system. No known exploits are currently reported in the wild, and no patches have been published yet. The presence of hard-coded credentials in PowerShell 7.2.0 could allow attackers to gain unauthorized access to sensitive information or escalate privileges within affected environments, potentially undermining trust in automation and scripting tasks that rely on PowerShell. Given PowerShell's widespread use in system administration and automation, this vulnerability poses a significant risk if left unmitigated.
Potential Impact
For European organizations, the impact of CVE-2023-36013 could be substantial, especially for enterprises and public sector entities that rely heavily on PowerShell 7.2 for automation, configuration management, and operational tasks. The disclosure of hard-coded credentials can lead to unauthorized access to internal systems, data leakage, and lateral movement within networks. This could compromise sensitive personal data protected under GDPR, resulting in regulatory penalties and reputational damage. Critical infrastructure sectors such as finance, healthcare, energy, and government agencies are particularly at risk due to their reliance on PowerShell for automation and orchestration. The vulnerability could facilitate targeted attacks by threat actors aiming to exploit these credentials to gain footholds in networks, conduct espionage, or disrupt operations. Since the vulnerability does not require user interaction and can be exploited remotely, it increases the attack surface and the urgency for mitigation. Although no known exploits are currently active, the medium severity rating and ease of exploitation suggest that attackers may develop exploits in the near future, increasing risk for European organizations.
Mitigation Recommendations
1. Immediate mitigation should include auditing all systems running PowerShell 7.2.0 to identify affected installations. 2. Where possible, downgrade to earlier, unaffected versions of PowerShell or upgrade to a later patched version once available. 3. Implement network segmentation and restrict network access to systems running PowerShell 7.2.0 to trusted administrators only. 4. Employ application whitelisting and restrict execution policies to prevent unauthorized scripts from running. 5. Monitor logs and network traffic for unusual PowerShell activity that could indicate exploitation attempts. 6. Rotate any credentials that may have been exposed or are suspected to be hard-coded in scripts or automation workflows. 7. Use endpoint detection and response (EDR) tools to detect anomalous behavior related to PowerShell usage. 8. Engage with Microsoft support channels to obtain patches or workarounds as they become available. 9. Educate system administrators and DevOps teams about the risks of hard-coded credentials and encourage the use of secure credential management solutions such as Azure Key Vault or other secrets management tools. 10. Conduct penetration testing focused on PowerShell environments to identify potential exploitation paths and validate mitigation effectiveness.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- microsoft
- Date Reserved
- 2023-06-20T20:44:39.822Z
- Cisa Enriched
- false
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d983bc4522896dcbee41d
Added to database: 5/21/2025, 9:09:15 AM
Last enriched: 6/25/2025, 5:07:07 AM
Last updated: 8/11/2025, 11:56:52 PM
Views: 17
Related Threats
CVE-2025-53948: CWE-415 Double Free in Santesoft Sante PACS Server
HighCVE-2025-52584: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-46269: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-54862: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumCVE-2025-54759: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.