An "authorized attacker" could exploit this weakness to gain elevated privileges, potentially reaching SYSTEM-level access.
Learn everything you need to know about two of the leading cloud-based infrastructure as a service providers, including how ...