Last Login: January 06, 2021
jheysel-r7's Contributions (3)
Users are encouraged to update as fast as possible.
Also see CVE-2020-15506 a MobileIron authentication bypass
Reasoning for low attacker value:
The web app is always up to date. The desktop client updates itself automatically. Teams checks for updates every few hours behind the scenes, downloads it, and then waits for the computer to be idle before silently installing the update, more info here
There is no supported way to prevent updates, more info here
The vulnerability itself is pretty bad, provided the attacker has local access to teams they can trigger RCE by a novel XSS injection in teams.microsoft.com that requires zero user interaction. However because Microsoft has made it quite difficult for users to stay on a vulnerable version, this makes it quite difficult for an attacker to get value out of the vulnerability. More info here
It also should be noted that the RCE gets triggered by the XSS injection that has to be sent through teams.microsoft.com – it is possible, though untested, that Microsoft has already patched this server side – not allowing the known XSS trigger to be pasted through to affected clients
It’s recommended you double check Microsoft Teams is up to date and auto updates are working as expected.
The exploit is readily available and quite easy to execute, I would advise prioritising the patching this of vulnerability asap