Skip to content
CyberOpsSec
CyberOpsSec

Just another cybersecurity site

  • Home
  • Posts
  • Knowledge
    • Auditing
    • Linux Commands
    • Ports & Protocols
    • Scanning
    • Sniffing
    • Syslog
    • Vulnerability/Patch Mgmt
  • About
  • Contact
CyberOpsSec

Just another cybersecurity site

Uninstall Vulnerable Software Remotely

Admin, May 8, 2024August 11, 2025

If you find a ton of boxes running vulnerable software that is no longer used you can use WMI/CIM. What’s the difference? WMI uses TCP ports 135/445/49152-65535 while CIM uses 5985/5986. CIM is slightly faster, but either way works.

WMI way. We are going to search a remote computer named Test for the FortiClient software. We will store this in the $software variable. We will then use the Uninstall() to complete the process

$software=Get-WmiObject -ComputerName Test -Namespace root\cimv2 -Class win32_product | ? name -like *forticlient*; $software.Uninstall()

CIM way. We are going to search a remote computer named Test for the FortiClient software. We will store this in the $software variable. We will then use invoke-cimmethod to complete the process

$software=Get-CimInstance -ComputerName Test -ClassName win32_product | ? name -like *forticlient*; $software | Invoke-CimMethod -MethodName uninstall

Vulnerabilities

Post navigation

Previous post
Next post

Related Posts

Blocking Responder

November 21, 2023August 11, 2025

Responder is usually one of the first things a pentester will fire up after plugging…

Read More

ICMP Timestamp Request Remote Date Disclosure

May 8, 2024August 11, 2025

You may have seen this vulnerability pop in Nessus. In order to remediate this we…

Read More

AD CS Vulnerabilities

January 11, 2024February 27, 2026

If an attacker gets domain user level permissions they could use tools such as certipy-ad…

Read More

Recent Posts

  • PRTG – How to monitor a Linux service
  • Patch Mgmt – Windows Update Issues
  • MSSQL Auditing
  • BloodHound CE Setup
  • UBI – User Browsing Isolation

Recent Comments

No comments to show.

Archives

  • January 2026
  • November 2025
  • August 2025
  • June 2025
  • November 2024
  • September 2024
  • June 2024
  • May 2024
  • March 2024
  • January 2024
  • November 2023
  • September 2023

Categories

  • Audit
  • EPP
  • Tools
  • Uncategorized
  • Vulnerabilities
©2026 CyberOpsSec | WordPress Theme by SuperbThemes