FAQ
How could an attacker exploit this vulnerability? For successful exploitation, a locally authenticated attacker needs to send a specially crafted request to the cryptography provider's vulnerable function.
No description was published by MSRC.