An attacker with authenticated, local access can exploit these vulnerabilities to escape the restricted shell and gain root privileges on the operating system.
To receive real-time threat advisories, please follow HiveForce Labs on LinkedIn.
Get through updates and upcoming events, and more directly in your inbox