Rewterz penetration testing services help organizations determine if a cyber attacker can gain access to their critical assets while giving them detailed insights of the overall business impact of a cyber attack.
Before Rewterz got its start, the market was in dire need of a specialized and dedicated information security company. It was nearly impossible for businesses to find a trustworthy provider that could truly cover all of their bases. We wanted to meet this need, giving companies across the globe a chance to get ahead while knowing that their data is in good hands.
Rewterz penetration testing services help organizations determine if a cyber attacker can gain access to their critical assets while giving them detailed insights of the overall business impact of a cyber attack.
Before Rewterz got its start, the market was in dire need of a specialized and dedicated information security company. It was nearly impossible for businesses to find a trustworthy provider that could truly cover all of their bases. We wanted to meet this need, giving companies across the globe a chance to get ahead while knowing that their data is in good hands.
Multiple vulnerabilities in Windows PowerShell can be exploited to bypass logging restrictions and execute arbitrary code.
IMPACT: NORMAL
PUBLISH DATE: 11-14-2018
OVERVIEW
Multiple vulnerabilities have been reported in Windows PowerShell. By successfully exploiting them, malicious local users can bypass certain security restrictions. Malicious people may also compromise a vulnerable system. Updated versions are available.
ANALYSIS
The “ExpandArchive()” function contains an error when handling files. If exploited successfully, it will allow malicious people to execute arbitrary code.
Another error related to log management when handling special characters can be exploited to bypass logging restrictions and subsequently execute unlogged code.
AFFECTED PRODUCTS
Windows PowerShell 6.x
UPDATES
Update to a fixed version if available.
Update to version 6.0.5.
Update to version 6.1.1.
Fixed in the source code repository.
If you think you’re the victim of a cyber-attack, immediately send an email to soc@rewterz.com.