FAQ
According to the CVSS metric, the attack vector is physical (AV:P). What does that mean for this vulnerability? To exploit this vulnerability, an attacker needs physical access to the victim's machine.
FAQ
How could an attacker exploit this vulnerability? An unauthenticated attacker can use a specially crafted IMC.hiv file (with the registry configuration that needs to be changed), which could lead to elevation of privilege.
FAQ
What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.