Loading...

List all Intune remediation scripts containing Invoke-WebRequest without UseBasicParsing (CVE-2025-54100)


In this post I will share a script allowing you to find all remediation script (detection or remediation) impacted by the CVE-2025-54100.


Context 

Microsoft recently mitigated a high-severity PowerShell remote code execution vulnerability through the CVE-2025-54100.

You can get more info here or here.


The impact is that if you have a script containing the invoke-webrequest cmdlet it may not continue or show the following warning:



To avoid this, you need to add -UseBasicParsing parameter.


See below an example of URL with issue:

❌ Broken Code:

$response = Invoke-WebRequest 'https://msedgewebdriverstorage.blob.core.windows.net/edgewebdriver/LATEST_STABLE' 


✅ Fixed Code:

$response = Invoke-WebRequest 'https://msedgewebdriverstorage.blob.core.windows.net/edgewebdriver/LATEST_STABLE' -UseBasicParsing


The solution

The script works as below:

- Authenticate to Intune

- Get all remediation scripts

- Check all detection/remediation

- Look for invoke-webrequest without UseBasicParsing

- Export result


To run the script, use the below command:

.\Remediation_CVE2554100_Report.ps1 


Two parameters are available:

- GridView: export content in a gridview

- PST: export content in a PST


See below overview from gridview


See below overview from PST


You can find all remediation scripts with an issue in detection or remediation meaning with Invoke-WebRequest without UseBasicParsing.


Get the script

Click on the below GitHub picture to get the script

slider 2543450464464642694

Enregistrer un commentaire

Enregistrer un commentaire

emo-but-icon

Accueil item