Loading...

List all Intune remediation scripts containing Invoke-WebRequest without UseBasicParsing (CVE-2025-54100)


In this post I will share a script allowing you to find all remediation script (detection or remediation) impacted by the CVE-2025-54100.


Context 

Microsoft recently mitigated a high-severity PowerShell remote code execution vulnerability through the CVE-2025-54100.

You can get more info here or here.


The impact is that if you have a script containing the invoke-webrequest cmdlet it may not continue or show the following warning:



To avoid this, you need to add -UseBasicParsing parameter.


See below an example of URL with issue:

❌ Broken Code:

$response = Invoke-WebRequest 'https://msedgewebdriverstorage.blob.core.windows.net/edgewebdriver/LATEST_STABLE' 


✅ Fixed Code:

$response = Invoke-WebRequest 'https://msedgewebdriverstorage.blob.core.windows.net/edgewebdriver/LATEST_STABLE' -UseBasicParsing


The solution

The script works as below:

- Authenticate to Intune

- Get all remediation scripts

- Check all detection/remediation

- Look for invoke-webrequest without UseBasicParsing

- Export result


To run the script, use the below command:

.\Remediation_CVE2554100_Report.ps1 


Two parameters are available:

- GridView: export content in a gridview

- PST: export content in a PST


See below overview from gridview


See below overview from PST


You can find all remediation scripts with an issue in detection or remediation meaning with Invoke-WebRequest without UseBasicParsing.


Get the script

Click on the below GitHub picture to get the script

slider 2543450464464642694

Enregistrer un commentaire

Accueil item

Award

Sponsors

Learn KQL in one month

You want to support me ?

Mes articles en français

Books in French


Stats