Описание
Microsoft Teams Remote Code Execution Vulnerability
FAQ
According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?
A user would need to join a malicious Microsoft Teams meeting set up by the attacker.
According to the CVSS metric, the attack vector is network (AV:N) and privilege required is none (PR:N). What is the target used in the context of the remote code execution?
An attacker would be required to trick the victim into joining a Teams meeting which would enable them to perform remote code execution in the context of the victim user. The attacker does not need privileges to attempt to exploit this vulnerability.
According to the CVSS metric, successful exploitation of this vulnerability could lead to total loss of confidentiality (C:H), integrity (I:H), and availability (A:H). What does that mean for this vulnerability?
An attacker who successfully exploits this vulnerability could perform a remote attack that could enable access to the victim's information and the ability to alter information. Successful exploitation could also potentially cause downtime for the client machine.
Обновления
| Продукт | Статья | Обновление |
|---|---|---|
| Microsoft Teams for iOS | ||
| Microsoft Teams for Android | ||
| Microsoft Teams for Desktop | ||
| Microsoft Teams for Mac |
Показывать по
Возможность эксплуатации
Publicly Disclosed
Exploited
Latest Software Release
DOS
EPSS
8.8 High
CVSS3
Связанные уязвимости
Microsoft Teams Remote Code Execution Vulnerability
Уязвимость корпоративной платформы Microsoft Teams, связанная с недостаточной проверкой вводимых данных, позволяющая нарушителю выполнить произвольный код
EPSS
8.8 High
CVSS3