FAQ
What privileges are required to exploit this vulnerability? To exploit this vulnerability, an attacker would have to be present in the tenant as a system user.
No description was published by MSRC.