there is a possible way to bypass due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation.
This Cyber News was published on www.tenable.com. Publication date: Fri, 05 Apr 2024 00:00:00 +0000