Microsoft has told Azure users to update PowerShell — if they are using versions 7.0 or 7.1 — to address a remote code execution vulnerability patched earlier this year.
The tech giant has advised customers who manage their Azure resources using affected versions of the PowerShell task automation solution to update to versions 7.0.6 or 7.1.3. The updated version should be installed “as soon as possible.” Windows PowerShell 5.1 is not impacted.
The vulnerability, tracked as CVE-2021-26701 and rated high severity, was fixed by Microsoft in February with its Patch Tuesday updates. The issue exists in .NET 5 and .NET Core due to how text encoding is performed.
In its advisory for CVE-2021-26701, Microsoft says the flaw has been publicly disclosed but assigned it an exploitability rating of “exploitation less likely,” which indicates that “while exploit code could be created, an attacker would likely have difficulty creating the code, requiring expertise and/or sophisticated timing, and/or varied results when targeting the affected product.”
The advisory was released in February, but PowerShell 7.0 and 7.1 were only added to the list of impacted products in May.
Related: Microsoft Confirms ‘PrintNightmare’ is New Windows Security Flaw
Related: Microsoft Warns of Under-Attack Windows Kernel Flaw
Related: Microsoft Patches Code Execution, Privilege Escalation Flaws in Azure Sphere

Eduard Kovacs (@EduardKovacs) is a contributing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.
More from Eduard Kovacs
- EV Charging Management System Vulnerabilities Allow Disruption, Energy Theft
- Unpatched Econolite Traffic Controller Vulnerabilities Allow Remote Hacking
- Google Fi Data Breach Reportedly Led to SIM Swapping
- Microsoft’s Verified Publisher Status Abused in Email Theft Campaign
- British Retailer JD Sports Discloses Data Breach Affecting 10 Million Customers
- Meta Awards $27,000 Bounty for 2FA Bypass Vulnerability
- Industry Reactions to Hive Ransomware Takedown: Feedback Friday
- US Reiterates $10 Million Reward Offer After Disruption of Hive Ransomware
Latest News
- Cyber Insights 2023 | Supply Chain Security
- Cyber Insights 2023: Regulations
- Cyber Insights 2023: Ransomware
- Cyber Insights 2023: Quantum Computing and the Coming Cryptopocalypse
- EV Charging Management System Vulnerabilities Allow Disruption, Energy Theft
- Malicious NPM, PyPI Packages Stealing User Information
- VMware Confirms Exploit Code Released for Critical vRealize Logging Vulnerabilities
- 98% of Firms Have a Supply Chain Relationship That Has Been Breached: Analysis
