When you purchase through links on our site, we may earn an affiliate commission.Heres how it works.

To be able to exploit the vulnerability, an attacker would first need to compromise the endpoint separately.

ViaTom’s Hardware

More from TechRadar Pro