Skip to content
CyberOpsSec
CyberOpsSec

Just another cybersecurity site

  • Home
  • Posts
  • Knowledge
    • Auditing
    • Linux Commands
    • Ports & Protocols
    • Scanning
    • Sniffing
    • Syslog
    • Vulnerability/Patch Mgmt
  • About
  • Contact
CyberOpsSec

Just another cybersecurity site

Uninstall Vulnerable Software Remotely

Admin, May 8, 2024August 11, 2025

If you find a ton of boxes running vulnerable software that is no longer used you can use WMI/CIM. What’s the difference? WMI uses TCP ports 135/445/49152-65535 while CIM uses 5985/5986. CIM is slightly faster, but either way works.

WMI way. We are going to search a remote computer named Test for the FortiClient software. We will store this in the $software variable. We will then use the Uninstall() to complete the process

$software=Get-WmiObject -ComputerName Test -Namespace root\cimv2 -Class win32_product | ? name -like *forticlient*; $software.Uninstall()

CIM way. We are going to search a remote computer named Test for the FortiClient software. We will store this in the $software variable. We will then use invoke-cimmethod to complete the process

$software=Get-CimInstance -ComputerName Test -ClassName win32_product | ? name -like *forticlient*; $software | Invoke-CimMethod -MethodName uninstall

Vulnerabilities

Post navigation

Previous post
Next post

Related Posts

ICMP Timestamp Request Remote Date Disclosure

May 8, 2024August 11, 2025

You may have seen this vulnerability pop in Nessus. In order to remediate this we…

Read More

Rolling KRBTGT Account

September 30, 2024August 11, 2025

It is best practice to roll this account’s password every 180 days or immediately if…

Read More

Nessus False Positive

June 25, 2024August 11, 2025

Plugin ID: 132101Windows Speculative Execution Configuration Check According to MS: KB4072698: Windows Server and Azure…

Read More

Recent Posts

  • MSSQL Auditing
  • BloodHound CE Setup
  • UBI – User Browsing Isolation
  • Rolling KRBTGT Account
  • SentinelOne: Why it’s important to monitor and audit your EPP

Recent Comments

No comments to show.

Archives

  • August 2025
  • June 2025
  • November 2024
  • September 2024
  • June 2024
  • May 2024
  • March 2024
  • January 2024
  • November 2023
  • September 2023

Categories

  • Audit
  • EPP
  • Tools
  • Uncategorized
  • Vulnerabilities
©2025 CyberOpsSec | WordPress Theme by SuperbThemes