When you purchase through links on our site, we may earn an affiliate commission.Heres how it works.

After that, the access remains enabled until the user, once again, explicitly denies it.

The company told the researchers that there are too many variables, making exploiting these flaws highly unlikely.

A computer screen showing a spreadsheet in use.

More from TechRadar Pro