Improper input validation in Windows Hello allows an unauthorized attacker to bypass a security feature over a network.
According to the CVSS metric, successful exploitation could lead to a scope change (S:C). What does this mean for this vulnerability? This vulnerability could lead to the attacker gaining the ability to interact with other tenant’s applications and content. According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability? Successful exploitation of this vulnerability requires an attacker to prepare the target environment to improve exploit reliability. What kind of security feature could be bypassed by successfully exploiting this vulnerability? An attacker who successfully exploited this vulnerability could bypass the MFA required for Windows Hello for Business PIN provisioning. Where can I find more information about Windows Hello for Business PIN provisioning? Please see Windows Hello for Business PIN provisioning for updated details.
sec-42a020b982ef, sec-42a020b982ef