• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
Zero Click Wormable Rce Vulnerability Reported In Microsoft Teams

Zero-Click Wormable RCE Vulnerability Reported in Microsoft Teams

You are here: Home / General Cyber Security News / Zero-Click Wormable RCE Vulnerability Reported in Microsoft Teams

A zero-click distant code execution (RCE) bug in Microsoft Groups desktop applications could have allowed an adversary to execute arbitrary code by just sending a specially-crafted chat information and compromise a target’s process.

The issues had been noted to the Windows maker by Oskars Vegeris, a security engineer from Evolution Gaming, on August 31, 2020, just before they were being dealt with at the stop of Oct.

“No person conversation is necessary, exploit executes on viewing the chat concept,” Vegeris described in a specialized generate-up.

✔ Approved Seller by TheCyberSecurity.News From Our Partners
Bitdefender Internet Security 2021

Protect yourself against all threads using Bitderender. Get Bitdefender Internet Security with 68% discount from a bitdefender official seller SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


The consequence is a “full decline of confidentiality and integrity for conclude end users — access to personal chats, data files, inside network, non-public keys and personal facts outdoors MS Teams,” the researcher additional.

Worse, the RCE is cross-platform — affecting Microsoft Teams for Windows (v1.3.00.21759), Linux (v1.3.00.16851), macOS (v1.3.00.23764), and the web (teams.microsoft.com) — and could be created wormable, indicating it could be propagated by instantly reposting the malicious payload to other channels.

This also signifies the exploit can be handed on from a person account to a full group of people, therefore compromising an whole channel.

To accomplish this, the exploit chain strings jointly a cross-web site scripting (XSS) flaw existing in the Teams ‘@mentions’ operation and a JavaScript-based mostly RCE payload to submit a harmless-on the lookout chat information made up of a person mention either in the type of a direct concept or to a channel.

Simply just browsing the chat at the recipient’s end sales opportunities to the execution of the payload, allowing it to be exploited to log users’ SSO tokens to community storage for exfiltration and execute any command of the attacker’s preference.

This is not the 1st time these RCE flaws had been observed in Groups and other organization-centered messaging applications.

Chief amongst them is a separate RCE vulnerability in Microsoft Teams (CVE-2020-17091) that the enterprise patched as element of its November 2020 Patch Tuesday previous month.

Before this August, Vegeris also disclosed a critical “wormable” flaw in Slack’s desktop variation that could have allowed an attacker to consider around the technique by merely sending a malicious file to a further Slack person.

Then in September, networking devices maker Cisco patched a similar flaw in its Jabber video conferencing and messaging app for Windows that, if exploited, could make it possible for an authenticated, remote attacker to execute arbitrary code.

Observed this write-up fascinating? Abide by THN on Fb, Twitter  and LinkedIn to read through much more exclusive material we submit.


Some sections of this article are sourced from:
thehackernews.com

Previous Post: «Nsa Warns Russian Hacker Exploiting Vmware Bug To Breach Corporate NSA Warns Russian Hacker Exploiting VMware Bug to Breach Corporate Networks
Next Post: BTC-e Founder Gets Five Years for Money Laundering Cyber Security News»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Recent Posts

  • Big Tech Bans Social Networking App
  • Lack of Funding Could Lead to “Lost Generation” of Cyber-Startups
  • Unveiled: SUNSPOT Malware Was Used to Inject SolarWinds Backdoor
  • ‘I’ll Teams you’: Employees assume security of links, file sharing via Microsoft comms platform
  • DarkSide decryptor unlocks systems without ransom payment – for now
  • Researchers see links between SolarWinds Sunburst malware and Russian Turla APT group
  • Millions of Social Profiles Leaked by Chinese Data-Scrapers
  • Feds will weigh whether cyber best practices were followed when assessing HIPAA fines
  • SolarWinds Hack Potentially Linked to Turla APT
  • 10 quick tips to identifying phishing emails

Copyright © TheCyberSecurity.News, All Rights Reserved.