Tag
#Microsoft AutoUpdate (MAU)
Improper link resolution before file access ('link following') in Microsoft Teams allows an authorized attacker to elevate privileges locally.
Improper input validation in Microsoft AutoUpdate (MAU) allows an authorized attacker to elevate privileges locally.
**How could an attacker exploit this vulnerability?** To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that could exploit the vulnerability and take control of an affected system.
**How could an attacker exploit this vulnerability?** To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that could exploit the vulnerability and take control of an affected system.
**What privileges could be gained by an attacker who successfully exploited the vulnerability?** An attacker who successfully exploits this vulnerability could elevate their privileges to perform commands as Root in the target environment.
**What privileges could be gained by an attacker who successfully exploited the vulnerability?** An attacker who successfully exploits this vulnerability could elevate their privileges to perform commands as Root in the target environment.
**How can I find out what version of Teams I am running?** 1. Select the three dots (...) at the top right of the Teams window. 2. Select **Settings** 3. Select **About**, then **Version**. 4. The version will be displayed in a ribbon at the top of the Teams application. 5. You can get the latest version from the **Settings** menu by selecting **Check for updates**.