FAQ
What privileges could be gained by an attacker who successfully exploited the vulnerability? An attacker who successfully exploited this vulnerability could create, modify, or delete files in the security context of the "NT AUTHORITY\SYSTEM" account.
FAQ
According to the CVSS metric, user interaction is required (UI:R) and privileges required is Low (PR:L). What does that mean for this vulnerability? An authenticated attacker could place a malicious file in a specified custom module path and then wait for a user to run a privileged .NET application that starts a PowerShell session under NT AUTHORITY\SYSTEM privileges
Microsoft PowerShell Elevation of Privilege Vulnerability
Improper access control in Microsoft PowerShell allows an authorized attacker to elevate privileges locally.