Описание
Microsoft AutoUpdate (MAU) Elevation of Privilege Vulnerability
Improper link resolution before file access ('link following') in Microsoft AutoUpdate (MAU) allows an authorized attacker to elevate privileges locally.
FAQ
What privileges could be gained by an attacker who successfully exploited the vulnerability?
An attacker who successfully exploits this vulnerability could elevate their privileges to perform commands as Root in the target environment.
How could an attacker exploit this vulnerability?
A user can download an installer and before the user runs the installer, the attacker could replace it with a malicious installer. When the victim runs the malicious installer the attacker could elevate their privileges.
Возможность эксплуатации
Publicly Disclosed
Exploited
Latest Software Release
EPSS
7.8 High
CVSS3
Связанные уязвимости
Improper link resolution before file access ('link following') in Microsoft AutoUpdate (MAU) allows an authorized attacker to elevate privileges locally.
Improper link resolution before file access ('link following') in Microsoft AutoUpdate (MAU) allows an authorized attacker to elevate privileges locally.
Уязвимость приложения автоматического обновления продуктов MS Office Microsoft AutoUpdate (MAU) for Mac, связанная с неверным определением ссылки перед доступом к файлу, позволяющая нарушителю повысить свои привилегии
EPSS
7.8 High
CVSS3