Microsoft fixes flaw after being called irresponsible by Tenable CEO
Tenable also shared proof of concept exploit code and information on the steps required to find vulnerable connector hostnames and how to craft the POST requests to interact with the unsecured API endpoints.