FAQ
How could an attacker exploit this vulnerability? To successfully exploit this remote code execution vulnerability, an attacker could send a malicious logon request to the target domain controller.
No description was published by MSRC.