This was in reference to the Follina, the first zero-day. The guidance reads:
"A remote code execution vulnerability exists when MDST is called using the URL protocol from a calling application such as Word. An attacker who successfully exploits this vulnerability can run arbitrary code with the privileges of the calling application. The attacker can then install programs, view, change, or delete data, or create new accounts in the context allowed by the user’s rights."
Topics: Security, cloud security, M365
Topics: Security, cloud security, M365
Services
Business Productivity
Unified Communication
Business Consulting
Systems & Data
Cloud Architecture, Adoption, Migration
Windows Virtual Desktop in Azure
App Development
About Us