Summary
| Item | Details |
| Vulnerability Name |
PowerShell Remote Code Execution (CVE-2025-54100) |
| Released on |
December 09, 2025 |
| Affected Component |
PowerShell |
| Affected Version |
Windows Server 2025 (Server Core installation) Windows Server 2025 Windows Server 2022, 23H2 Edition (Server Core installation) Windows Server 2022 (Server Core installation) Windows Server 2022 Windows Server 2019 (Server Core installation) Windows Server 2019 Windows Server 2016 (Server Core installation) Windows Server 2016 Windows Server 2012 R2 (Server Core installation) Windows Server 2012 R2 Windows Server 2012 (Server Core installation) Windows Server 2012 Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) Windows Server 2008 R2 for x64-based Systems Service Pack 1 Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) Windows Server 2008 for x64-based Systems Service Pack 2 Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) Windows Server 2008 for 32-bit Systems Service Pack 2 Windows 11 Version 25H2 for x64-based Systems Windows 11 Version 25H2 for ARM64-based Systems Windows 11 Version 24H2 for x64-based Systems Windows 11 Version 24H2 for ARM64-based Systems Windows 11 Version 23H2 for x64-based Systems Windows 11 Version 23H2 for ARM64-based Systems Windows 10 Version 22H2 for x64-based Systems Windows 10 Version 22H2 for ARM64-based Systems Windows 10 Version 22H2 for 32-bit Systems Windows 10 Version 21H2 for x64-based Systems Windows 10 Version 21H2 for ARM64-based Systems Windows 10 Version 21H2 for 32-bit Systems Windows 10 Version 1809 for x64-based Systems Windows 10 Version 1809 for 32-bit Systems Windows 10 Version 1607 for x64-based Systems Windows 10 Version 1607 for 32-bit Systems |
| Vulnerability Type |
Remote code execution |
| Exploitation Condition |
1. User authentication: not required. 2. Precondition: The attacker utilizes social engineering techniques to entice the victim to access the attacker's crafted website via PowerShell. 3. Trigger mode: local. (The word "remote" in terms of vulnerability type indicates the remote location of the attacker.) |
| Impact |
Exploitation difficulty: difficult. The victim needs to be enticed to access the attacker's crafted website via PowerShell. Severity: critical. This vulnerability enables the attacker to execute arbitrary code with the victim's privileges. |
| Official Solution |
Available |
About the Vulnerability
Component Introduction
PowerShell is an automation and scripting environment introduced by Microsoft. Built on the .NET runtime, PowerShell is object-oriented rather than purely text-based. It abstracts system resources into manageable objects and enables configuration management, bulk operations, and task automation through a unified cmdlet pipeline mechanism. Deeply integrated into the Windows management framework, PowerShell supports operations on the registry, services, processes, networks, and cloud resources. Its scripting capabilities and modular ecosystem make it a crucial tool for system administrators and engineers to perform system management, operational automation, and troubleshooting.
Vulnerability Description
On December 26, 2025, Sangfor FarSight Labs received notification of the remote code execution vulnerability in PowerShell (CVE-2025-54100), classified as critical in threat level.
Specifically, PowerShell contains a remote code execution vulnerability that allows a remote unauthenticated attacker to utilize social engineering techniques to entice a victim to access the attacker's crafted website via PowerShell, potentially resulting in remote code execution.
Affected Versions
The following Windows versions are affected:
| Item | Details |
| Affected Version |
Windows Server 2025 (Server Core installation) Windows Server 2025 Windows Server 2022, 23H2 Edition (Server Core installation) Windows Server 2022 (Server Core installation) Windows Server 2022 Windows Server 2019 (Server Core installation) Windows Server 2019 Windows Server 2016 (Server Core installation) Windows Server 2016 Windows Server 2012 R2 (Server Core installation) Windows Server 2012 R2 Windows Server 2012 (Server Core installation) Windows Server 2012 Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) Windows Server 2008 R2 for x64-based Systems Service Pack 1 Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) Windows Server 2008 for x64-based Systems Service Pack 2 Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) Windows Server 2008 for 32-bit Systems Service Pack 2 Windows 11 Version 25H2 for x64-based Systems Windows 11 Version 25H2 for ARM64-based Systems Windows 11 Version 24H2 for x64-based Systems Windows 11 Version 24H2 for ARM64-based Systems Windows 11 Version 23H2 for x64-based Systems Windows 11 Version 23H2 for ARM64-based Systems Windows 10 Version 22H2 for x64-based Systems Windows 10 Version 22H2 for ARM64-based Systems Windows 10 Version 22H2 for 32-bit Systems Windows 10 Version 21H2 for x64-based Systems Windows 10 Version 21H2 for ARM64-based Systems Windows 10 Version 21H2 for 32-bit Systems Windows 10 Version 1809 for x64-based Systems Windows 10 Version 1809 for 32-bit Systems Windows 10 Version 1607 for x64-based Systems Windows 10 Version 1607 for 32-bit Systems |
Solutions
Remediation Solutions
Temporary Solutions
- Do not use curl or Mshta to parse untrusted links or addresses.
- When using the Invoke-WebRequest command to parse an address, include the -UseBasicParsing parameter.
Official Solution
The latest versions have been officially released to fix the vulnerability. Affected users are advised to update Windows to one of the latest versions as needed.
Timeline
On December 09, 2025, Sangfor FarSight Labs received notification of the remote code execution vulnerability in PowerShell (CVE-2025-54100).
On December 26, 2025, Sangfor FarSight Labs released a vulnerability alert.
Reference
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-54100
Learn More
Sangfor FarSight Labs researches the latest cyber threats and unknown zero-day vulnerabilities, alerting customers to potential dangers to their organizations, and providing real-time solutions with actionable intelligence. Sangfor FarSight Labs works with other security vendors and the security community at large to identify and verify global cyber threats, providing fast and easy protection for customers.