FAQ
How could an attacker exploit this vulnerability? The attacker would need to trick or coerce a legitimate user into downloading and executing a specially crafted install file
No description was published by MSRC.